Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZWyrFp7WBM.exe

Overview

General Information

Sample name:ZWyrFp7WBM.exe
renamed because original name is a hash value
Original sample name:70cb20742efa1fe2892fa0a30e7f2f9473230c16373c258221ddc81117d99d16.exe
Analysis ID:1632364
MD5:22b61880f78223f18df46e6ca6421da0
SHA1:8dda507e9ede9bbbca57ff9d9e613478f8afe3f7
SHA256:70cb20742efa1fe2892fa0a30e7f2f9473230c16373c258221ddc81117d99d16
Tags:AgentTeslaexeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Drops VBS files to the startup folder
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ZWyrFp7WBM.exe (PID: 7096 cmdline: "C:\Users\user\Desktop\ZWyrFp7WBM.exe" MD5: 22B61880F78223F18DF46E6CA6421DA0)
    • InstallUtil.exe (PID: 6680 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • wscript.exe (PID: 6992 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • iulue.exe (PID: 3844 cmdline: "C:\Users\user\AppData\Roaming\iulue.exe" MD5: 22B61880F78223F18DF46E6CA6421DA0)
      • InstallUtil.exe (PID: 1316 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "162.254.34.31", "Username": "sendxambro@educt.shop", "Password": "ABwuRZS5Mjh5"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000C.00000002.2105135894.0000000003274000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000C.00000002.2105135894.000000000326C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.1588947463.000000000251C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000002.00000002.1588947463.0000000002524000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000005.00000002.1620032141.0000000003FC9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              Click to see the 31 entries
              SourceRuleDescriptionAuthorStrings
              5.2.iulue.exe.3fc9340.6.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                5.2.iulue.exe.3f09b28.8.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  5.2.iulue.exe.44d4100.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    5.2.iulue.exe.44d4100.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      5.2.iulue.exe.44d4100.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                      • 0x3167b:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                      • 0x316ed:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                      • 0x31777:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                      • 0x31809:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                      • 0x31873:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                      • 0x318e5:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                      • 0x3197b:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                      • 0x31a0b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                      Click to see the 23 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbs" , ProcessId: 6992, ProcessName: wscript.exe
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 162.254.34.31, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, Initiated: true, ProcessId: 6680, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49688
                      Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbs" , ProcessId: 6992, ProcessName: wscript.exe

                      Data Obfuscation

                      barindex
                      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\ZWyrFp7WBM.exe, ProcessId: 7096, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbs
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-07T22:50:34.750469+010020301711A Network Trojan was detected192.168.2.849698162.254.34.31587TCP
                      2025-03-07T22:51:53.306496+010020301711A Network Trojan was detected192.168.2.849688162.254.34.31587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-07T22:51:14.729266+010028555421A Network Trojan was detected192.168.2.849688162.254.34.31587TCP
                      2025-03-07T22:51:55.846943+010028555421A Network Trojan was detected192.168.2.849698162.254.34.31587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-07T22:51:14.729266+010028552451A Network Trojan was detected192.168.2.849688162.254.34.31587TCP
                      2025-03-07T22:51:55.846943+010028552451A Network Trojan was detected192.168.2.849698162.254.34.31587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-03-07T22:50:34.750469+010028400321A Network Trojan was detected192.168.2.849698162.254.34.31587TCP
                      2025-03-07T22:51:53.306496+010028400321A Network Trojan was detected192.168.2.849688162.254.34.31587TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: ZWyrFp7WBM.exeAvira: detected
                      Source: C:\Users\user\AppData\Roaming\iulue.exeAvira: detection malicious, Label: TR/AVI.PWS.Agent.wahsz
                      Source: 0.2.ZWyrFp7WBM.exe.45aa430.4.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "162.254.34.31", "Username": "sendxambro@educt.shop", "Password": "ABwuRZS5Mjh5"}
                      Source: C:\Users\user\AppData\Roaming\iulue.exeReversingLabs: Detection: 65%
                      Source: ZWyrFp7WBM.exeVirustotal: Detection: 65%Perma Link
                      Source: ZWyrFp7WBM.exeReversingLabs: Detection: 65%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: ZWyrFp7WBM.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 194.15.112.248:443 -> 192.168.2.8:49685 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.8:49687 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 194.15.112.248:443 -> 192.168.2.8:49692 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.8:49697 version: TLS 1.2
                      Source: ZWyrFp7WBM.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004459000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.00000000044A9000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1155790695.00000000060A0000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003C3E000.00000004.00000800.00020000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B87000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: ZWyrFp7WBM.exe, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004459000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.00000000044A9000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1155790695.00000000060A0000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003C3E000.00000004.00000800.00020000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B87000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000481E000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1162758154.0000000007250000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B19000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000481E000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1162758154.0000000007250000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B19000.00000004.00000800.00020000.00000000.sdmp
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.8:49688 -> 162.254.34.31:587
                      Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.8:49688 -> 162.254.34.31:587
                      Source: Network trafficSuricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.8:49698 -> 162.254.34.31:587
                      Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.8:49698 -> 162.254.34.31:587
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.8:49688 -> 162.254.34.31:587
                      Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.8:49688 -> 162.254.34.31:587
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.8:49698 -> 162.254.34.31:587
                      Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.8:49698 -> 162.254.34.31:587
                      Source: global trafficTCP traffic: 192.168.2.8:49688 -> 162.254.34.31:587
                      Source: global trafficHTTP traffic detected: GET /xvXf HTTP/1.1Host: oshi.atConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xvXf HTTP/1.1Host: oshi.atConnection: Keep-Alive
                      Source: Joe Sandbox ViewIP Address: 194.15.112.248 194.15.112.248
                      Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                      Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                      Source: Joe Sandbox ViewASN Name: VIVIDHOSTINGUS VIVIDHOSTINGUS
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: global trafficTCP traffic: 192.168.2.8:49688 -> 162.254.34.31:587
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET /xvXf HTTP/1.1Host: oshi.atConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /xvXf HTTP/1.1Host: oshi.atConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: oshi.at
                      Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                      Source: ZWyrFp7WBM.exe, iulue.exe.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                      Source: ZWyrFp7WBM.exe, iulue.exe.0.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                      Source: ZWyrFp7WBM.exe, iulue.exe.0.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
                      Source: ZWyrFp7WBM.exe, iulue.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                      Source: ZWyrFp7WBM.exe, iulue.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                      Source: ZWyrFp7WBM.exe, iulue.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                      Source: ZWyrFp7WBM.exe, iulue.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                      Source: ZWyrFp7WBM.exe, iulue.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1142508415.0000000003451000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.1588947463.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, iulue.exe, 00000005.00000002.1578645893.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.2105135894.00000000031FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: ZWyrFp7WBM.exe, iulue.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                      Source: ZWyrFp7WBM.exe, iulue.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                      Source: ZWyrFp7WBM.exe, iulue.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000456D000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.1576277029.0000000000192000.00000040.00000400.00020000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000004061000.00000004.00000800.00020000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003AC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000456D000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.1588947463.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.1576277029.0000000000192000.00000040.00000400.00020000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000004061000.00000004.00000800.00020000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003AC9000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.2105135894.00000000031FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                      Source: InstallUtil.exe, 00000002.00000002.1588947463.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.2105135894.00000000031FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: InstallUtil.exe, 00000002.00000002.1588947463.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000C.00000002.2105135894.00000000031FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000481E000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1162758154.0000000007250000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000481E000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1162758154.0000000007250000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B19000.00000004.00000800.00020000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003AC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000481E000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1162758154.0000000007250000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1142508415.0000000003451000.00000004.00000800.00020000.00000000.sdmp, iulue.exe, 00000005.00000002.1578645893.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at
                      Source: ZWyrFp7WBM.exe, iulue.exe.0.drString found in binary or memory: https://oshi.at/xvXf
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000481E000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1162758154.0000000007250000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1142508415.000000000349C000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000481E000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1162758154.0000000007250000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B19000.00000004.00000800.00020000.00000000.sdmp, iulue.exe, 00000005.00000002.1578645893.0000000002B7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000481E000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1162758154.0000000007250000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                      Source: ZWyrFp7WBM.exe, iulue.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49687
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
                      Source: unknownHTTPS traffic detected: 194.15.112.248:443 -> 192.168.2.8:49685 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.8:49687 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 194.15.112.248:443 -> 192.168.2.8:49692 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.8:49697 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.ZWyrFp7WBM.exe.45aa430.4.raw.unpack, SKTzxzsJw.cs.Net Code: nUAqbab

                      System Summary

                      barindex
                      Source: 5.2.iulue.exe.44d4100.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 2.2.InstallUtil.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 5.2.iulue.exe.44d4100.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.ZWyrFp7WBM.exe.45aa430.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 5.2.iulue.exe.42922e8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.ZWyrFp7WBM.exe.4582410.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.ZWyrFp7WBM.exe.45aa430.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeCode function: 5_2_05A6DD80 NtResumeThread,5_2_05A6DD80
                      Source: C:\Users\user\AppData\Roaming\iulue.exeCode function: 5_2_05A6A2A0 NtProtectVirtualMemory,5_2_05A6A2A0
                      Source: C:\Users\user\AppData\Roaming\iulue.exeCode function: 5_2_05A6DD7A NtResumeThread,5_2_05A6DD7A
                      Source: C:\Users\user\AppData\Roaming\iulue.exeCode function: 5_2_05A6A299 NtProtectVirtualMemory,5_2_05A6A299
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeCode function: 0_2_060F1CA00_2_060F1CA0
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeCode function: 0_2_060F10380_2_060F1038
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeCode function: 0_2_060A6E5B0_2_060A6E5B
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeCode function: 0_2_016FEDE80_2_016FEDE8
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeCode function: 0_2_016FB0300_2_016FB030
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeCode function: 0_2_0798FB900_2_0798FB90
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeCode function: 0_2_0798EAD80_2_0798EAD8
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeCode function: 0_2_0798E4F00_2_0798E4F0
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeCode function: 0_2_079700060_2_07970006
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeCode function: 0_2_079700400_2_07970040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_0086E5002_2_0086E500
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00864A902_2_00864A90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_0086DC982_2_0086DC98
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00863E782_2_00863E78
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_0086AF852_2_0086AF85
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_008641C02_2_008641C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E5A1982_2_05E5A198
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E5BC482_2_05E5BC48
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E67DF02_2_05E67DF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E666682_2_05E66668
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E656402_2_05E65640
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E631002_2_05E63100
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E6B2AB2_2_05E6B2AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E6C2002_2_05E6C200
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E65D5F2_2_05E65D5F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E6240A2_2_05E6240A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E6E4182_2_05E6E418
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E677102_2_05E67710
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E600402_2_05E60040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_05E600192_2_05E60019
                      Source: C:\Users\user\AppData\Roaming\iulue.exeCode function: 5_2_00E9EDE85_2_00E9EDE8
                      Source: C:\Users\user\AppData\Roaming\iulue.exeCode function: 5_2_00E9B0305_2_00E9B030
                      Source: C:\Users\user\AppData\Roaming\iulue.exeCode function: 5_2_05A6BC385_2_05A6BC38
                      Source: C:\Users\user\AppData\Roaming\iulue.exeCode function: 5_2_05A66F085_2_05A66F08
                      Source: C:\Users\user\AppData\Roaming\iulue.exeCode function: 5_2_05A6BBE95_2_05A6BBE9
                      Source: C:\Users\user\AppData\Roaming\iulue.exeCode function: 5_2_05A6BC285_2_05A6BC28
                      Source: C:\Users\user\AppData\Roaming\iulue.exeCode function: 5_2_05A66EF95_2_05A66EF9
                      Source: C:\Users\user\AppData\Roaming\iulue.exeCode function: 5_2_05A6C38A5_2_05A6C38A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0199E67012_2_0199E670
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_01994A9812_2_01994A98
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_0199AA1812_2_0199AA18
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_01993E8012_2_01993E80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_019941C812_2_019941C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C1A19412_2_06C1A194
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C1BB5812_2_06C1BB58
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C2564012_2_06C25640
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C2666812_2_06C26668
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C2241812_2_06C22418
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C2B2B012_2_06C2B2B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C2C20012_2_06C2C200
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C27DF012_2_06C27DF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C2771012_2_06C27710
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C2E41812_2_06C2E418
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C2004012_2_06C20040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C25D7012_2_06C25D70
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C2002112_2_06C20021
                      Source: ZWyrFp7WBM.exeStatic PE information: invalid certificate
                      Source: ZWyrFp7WBM.exeBinary or memory string: OriginalFilename vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004459000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1142508415.000000000349C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1142508415.00000000037F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename6623bc4b-fa2b-443b-b079-7932cd528c3c.exe4 vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1142124894.000000000175E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.00000000044A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.00000000049F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHmfllr.dll" vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1157717722.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameHmfllr.dll" vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000481E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1155790695.00000000060A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000456D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename6623bc4b-fa2b-443b-b079-7932cd528c3c.exe4 vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000456D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLkzpbozzvs.exe, vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000488C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHmfllr.dll" vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1162758154.0000000007250000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exeBinary or memory string: OriginalFilenameLkzpbozzvs.exe, vs ZWyrFp7WBM.exe
                      Source: ZWyrFp7WBM.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 5.2.iulue.exe.44d4100.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 2.2.InstallUtil.exe.190000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 5.2.iulue.exe.44d4100.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.ZWyrFp7WBM.exe.45aa430.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 5.2.iulue.exe.42922e8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.ZWyrFp7WBM.exe.4582410.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.ZWyrFp7WBM.exe.45aa430.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: ZWyrFp7WBM.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: iulue.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: ZWyrFp7WBM.exe, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: ZWyrFp7WBM.exe, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: ZWyrFp7WBM.exe, -.csCryptographic APIs: 'CreateDecryptor'
                      Source: iulue.exe.0.dr, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: iulue.exe.0.dr, -.csCryptographic APIs: 'TransformFinalBlock'
                      Source: iulue.exe.0.dr, -.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.ZWyrFp7WBM.exe.45aa430.4.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.ZWyrFp7WBM.exe.45aa430.4.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.ZWyrFp7WBM.exe.45aa430.4.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.ZWyrFp7WBM.exe.45aa430.4.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.ZWyrFp7WBM.exe.45aa430.4.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.ZWyrFp7WBM.exe.45aa430.4.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@8/3@2/3
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                      Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbs"
                      Source: ZWyrFp7WBM.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: ZWyrFp7WBM.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: ZWyrFp7WBM.exeVirustotal: Detection: 65%
                      Source: ZWyrFp7WBM.exeReversingLabs: Detection: 65%
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeFile read: C:\Users\user\Desktop\ZWyrFp7WBM.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\ZWyrFp7WBM.exe "C:\Users\user\Desktop\ZWyrFp7WBM.exe"
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                      Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbs"
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\iulue.exe "C:\Users\user\AppData\Roaming\iulue.exe"
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\iulue.exe "C:\Users\user\AppData\Roaming\iulue.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: ZWyrFp7WBM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: ZWyrFp7WBM.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: ZWyrFp7WBM.exeStatic file information: File size 1389176 > 1048576
                      Source: ZWyrFp7WBM.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x14b800
                      Source: ZWyrFp7WBM.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004459000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.00000000044A9000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1155790695.00000000060A0000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003C3E000.00000004.00000800.00020000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B87000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: ZWyrFp7WBM.exe, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004459000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.00000000044A9000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1155790695.00000000060A0000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003C3E000.00000004.00000800.00020000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B87000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000481E000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1162758154.0000000007250000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B19000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: ZWyrFp7WBM.exe, 00000000.00000002.1149953119.000000000481E000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, ZWyrFp7WBM.exe, 00000000.00000002.1162758154.0000000007250000.00000004.08000000.00040000.00000000.sdmp, iulue.exe, 00000005.00000002.1620032141.0000000003B19000.00000004.00000800.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: 0.2.ZWyrFp7WBM.exe.48b16b0.3.raw.unpack, cVZ1qQy1xbs0RNPiMDs.cs.Net Code: Type.GetTypeFromHandle(nNJRISQRTxnKEVw7XJv.mBrLOFaaKy(16777356)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(nNJRISQRTxnKEVw7XJv.mBrLOFaaKy(16777255)),Type.GetTypeFromHandle(nNJRISQRTxnKEVw7XJv.mBrLOFaaKy(16777287))})
                      Source: ZWyrFp7WBM.exe, -.cs.Net Code: _0001 System.AppDomain.Load(byte[])
                      Source: ZWyrFp7WBM.exe, -.cs.Net Code: _0001 System.Reflection.Assembly.Load(byte[])
                      Source: iulue.exe.0.dr, -.cs.Net Code: _0001 System.AppDomain.Load(byte[])
                      Source: iulue.exe.0.dr, -.cs.Net Code: _0001 System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.ZWyrFp7WBM.exe.46094d0.2.raw.unpack, -.cs.Net Code: _0001 System.AppDomain.Load(byte[])
                      Source: 0.2.ZWyrFp7WBM.exe.46094d0.2.raw.unpack, -.cs.Net Code: _0001 System.Reflection.Assembly.Load(byte[])
                      Source: Yara matchFile source: 5.2.iulue.exe.3fc9340.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.iulue.exe.3f09b28.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.iulue.exe.3ea1ee0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ZWyrFp7WBM.exe.7060000.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.iulue.exe.3fc9340.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ZWyrFp7WBM.exe.7060000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.iulue.exe.3d50988.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.1620032141.0000000003FC9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1142508415.000000000349C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1149953119.0000000004554000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1160814666.0000000007060000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1578645893.0000000002B7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1620032141.0000000003CE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ZWyrFp7WBM.exe PID: 7096, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: iulue.exe PID: 3844, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00860C45 push ebx; retf 2_2_00860C52
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00860C6D push edi; retf 2_2_00860C7A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_01997B10 push ebp; retf 12_2_01997A32
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_01990C53 push ebx; retf 12_2_01990C52
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_01990C45 push ebx; retf 12_2_01990C52
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_01990C6D push edi; retf 12_2_01990C7A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 12_2_06C1FCC7 push es; retf 12_2_06C1FCC8
                      Source: ZWyrFp7WBM.exeStatic PE information: section name: .text entropy: 7.872886244754763
                      Source: iulue.exe.0.drStatic PE information: section name: .text entropy: 7.872886244754763
                      Source: 0.2.ZWyrFp7WBM.exe.6ca0000.10.raw.unpack, B4qciP9OQvsC2jhItCO.csHigh entropy of concatenated method names: 'M8H9yareKY', 'UuT9Qicq64', 'iaI9kZ5rlV', 'sid9rgRPDT', 'KsW90CytGY', 'T0R9qwdc3b', 'JgF9AH9b1f', 'fm39NvGR98', 'cMd9XejFJo', 'MhD9e3mOp6'
                      Source: 0.2.ZWyrFp7WBM.exe.48b16b0.3.raw.unpack, iMRH60QYtoF2NVHOtog.csHigh entropy of concatenated method names: 'cE7dW9TNd2', 'M2KdzIFSr4', 'XrSqa7s6Fm', 'XD9q9A53HY', 'gw1qC0Kbk5', 'mCSqnU66YZ', 'Tkgq823N8M', 'xSj5qhc0Uq', 'ldLqjvDdKC', 'iPJqwR5Seg'
                      Source: 0.2.ZWyrFp7WBM.exe.48b16b0.3.raw.unpack, B4qciP9OQvsC2jhItCO.csHigh entropy of concatenated method names: 'M8H9yareKY', 'UuT9Qicq64', 'iaI9kZ5rlV', 'sid9rgRPDT', 'KsW90CytGY', 'T0R9qwdc3b', 'JgF9AH9b1f', 'fm39NvGR98', 'cMd9XejFJo', 'MhD9e3mOp6'
                      Source: 0.2.ZWyrFp7WBM.exe.48b16b0.3.raw.unpack, adRM5AOl1g6mWbwLpMi.csHigh entropy of concatenated method names: 'LeZ4rXVhrc', 'kZm4xTiEQh', 'c6I40fCEwW', 'MSELul6XNCpaNYWoCYT', 'IsImXI6TiIJt6BIRHN4', 'catOZiYFAi', 'YpAOYi1aVM', 'bUSOWJByhd', 'KUEOzDIrgC', 'FyI4aRc8XX'
                      Source: 0.2.ZWyrFp7WBM.exe.48b16b0.3.raw.unpack, cVZ1qQy1xbs0RNPiMDs.csHigh entropy of concatenated method names: 'PRt3couwItcG12RSAZQ', 'IV8N5fuP4w4hhPbS1id', 'mIqQSol99Q', 'vh0ry9Sq2v', 'ys3QkwiCvn', 'MddQG8hbFk', 'BL8Qr6EhfD', 'jFJQxEIwOs', 'jjfLMnrAZw', 'znWy2JCCj1'
                      Source: 0.2.ZWyrFp7WBM.exe.48b16b0.3.raw.unpack, O57Oy9QiJbOiRO1pS6y.csHigh entropy of concatenated method names: 'fqUQmtOF5t', 'CioQ6xR4QO', 'AkrQuZkRIb', 'D1aQIpB08S', 'Y76QUxhQYv', 'oVGQLffvbb', 't5dQKhXd2Y', 'GX0QlF65fl', 'AhDQDsXLup', 'sHOQZkYr1n'
                      Source: 0.2.ZWyrFp7WBM.exe.48b16b0.3.raw.unpack, MMMes8wuLPGhH2DZtdZ.csHigh entropy of concatenated method names: 'qMMwUDrHF6', 'RI5wKgKgDI', 'sJbwD1GvK8', 'spJwY66xO9', 'cDZwW1Hbkb', 'dYrwzimWnT', 'Sm9PanvWA1', 'FipP9h6r5f', 'uKkPCupdeL', 'GlMPnLAYAi'
                      Source: 0.2.ZWyrFp7WBM.exe.48b16b0.3.raw.unpack, NgQj9l4ma6uDoqraICi.csHigh entropy of concatenated method names: 'blX4Lo2D4V', 'iKD4Ku8aAn', 'Na64liaS2b', 'ppJ4D1M5II', 'MXu4Z1DDWW', 'K4p4YS9IDY', 'oMA4WEm8pv', 'M5L4zRYCSA', 'FQTya6dvKf', 'YxOy9HkMHD'
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeFile created: C:\Users\user\AppData\Roaming\iulue.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbsJump to dropped file
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbsJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iulue.vbsJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: ZWyrFp7WBM.exe PID: 7096, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: iulue.exe PID: 3844, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1142508415.000000000349C000.00000004.00000800.00020000.00000000.sdmp, iulue.exe, 00000005.00000002.1578645893.0000000002B7C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeMemory allocated: 16F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeMemory allocated: 3450000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeMemory allocated: 33A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 860000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 24A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2220000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeMemory allocated: E90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeMemory allocated: 2AC0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeMemory allocated: 4AC0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 1990000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 31F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 3020000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeWindow / User API: threadDelayed 1292Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeWindow / User API: threadDelayed 6081Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 1093Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 2873Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeWindow / User API: threadDelayed 3188Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeWindow / User API: threadDelayed 5883Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 2321Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -20291418481080494s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7144Thread sleep count: 1292 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -99874s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7144Thread sleep count: 6081 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -99766s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -99641s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -99532s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -99407s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -99297s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -99188s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -99063s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -98938s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -98813s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -98688s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -98569s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -98453s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -98344s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -98191s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -98063s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -97950s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -97702s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -97565s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -97375s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -97266s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -97153s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -97047s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -96938s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -96828s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -96719s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -96610s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -96485s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -96360s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -96235s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -96110s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -95985s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -95860s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -95735s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exe TID: 7128Thread sleep time: -95610s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -15679732462653109s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5256Thread sleep count: 1093 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -99890s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -99744s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -99627s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -99516s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5256Thread sleep count: 2873 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -99319s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -99203s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -99094s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -98969s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -98859s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -98750s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -98641s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -98531s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -98422s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -98313s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -98188s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -98063s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -97953s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -97843s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2916Thread sleep time: -97734s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -27670116110564310s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 6348Thread sleep count: 3188 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 6348Thread sleep count: 5883 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -99890s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -99782s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -99672s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -99563s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -99438s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -99313s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -99188s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -99032s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -98889s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -98781s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -98658s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -98547s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -98422s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -98313s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -98188s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -98078s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -97969s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -97844s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -97734s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -97625s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -97516s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -97407s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -97282s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -97157s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -97032s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -96922s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -96813s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -96688s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -96563s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -96438s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -96313s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -96192s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -96078s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -95964s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -95859s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -95700s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -95593s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -95482s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -95375s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -95266s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -95156s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exe TID: 7020Thread sleep time: -95047s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1464Thread sleep count: 308 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -99891s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1464Thread sleep count: 2321 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -99782s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -99625s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -99516s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -99219s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -98964s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -98860s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -98750s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -98638s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -98532s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -98422s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -98308s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -98203s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -98094s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 1492Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 99874Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 99766Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 99641Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 99532Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 99407Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 99297Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 99188Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 99063Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 98938Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 98813Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 98688Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 98569Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 98453Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 98344Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 98191Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 98063Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 97950Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 97702Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 97565Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 97375Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 97266Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 97153Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 97047Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 96938Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 96828Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 96719Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 96610Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 96485Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 96360Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 96235Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 96110Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 95985Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 95860Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 95735Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeThread delayed: delay time: 95610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99890Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99744Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99627Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99516Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99319Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99203Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99094Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98969Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98859Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98750Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98641Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98531Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98422Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98313Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98188Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98063Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97953Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97843Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97734Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 99890Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 99782Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 99672Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 99563Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 99438Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 99313Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 99188Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 99032Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 98889Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 98781Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 98658Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 98547Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 98422Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 98313Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 98188Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 98078Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 97969Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 97844Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 97734Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 97625Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 97516Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 97407Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 97282Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 97157Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 97032Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 96922Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 96813Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 96688Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 96563Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 96438Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 96313Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 96192Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 96078Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 95964Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 95859Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 95700Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 95593Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 95482Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 95375Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 95266Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 95156Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeThread delayed: delay time: 95047Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99891Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99782Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99625Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99516Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99219Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98964Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98750Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98638Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98532Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98422Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98308Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98203Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98094Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
                      Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                      Source: wscript.exe, 00000004.00000002.1246133659.00000196DE775000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: iulue.exe, 00000005.00000002.1576963538.0000000000F11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll[
                      Source: iulue.exe, 00000005.00000002.1578645893.0000000002B7C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                      Source: iulue.exe, 00000005.00000002.1578645893.0000000002B7C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                      Source: InstallUtil.exe, 0000000C.00000002.2116390434.0000000006493000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll>
                      Source: ZWyrFp7WBM.exe, 00000000.00000002.1142124894.00000000017CB000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.1597366179.0000000005614000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 190000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 190000Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 192000Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 1CC000Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 1CE000Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 2F0008Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43C000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43E000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 1116008Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Roaming\iulue.exe "C:\Users\user\AppData\Roaming\iulue.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeQueries volume information: C:\Users\user\Desktop\ZWyrFp7WBM.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeQueries volume information: C:\Users\user\AppData\Roaming\iulue.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\iulue.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\ZWyrFp7WBM.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 5.2.iulue.exe.44d4100.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.InstallUtil.exe.190000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.iulue.exe.44d4100.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ZWyrFp7WBM.exe.45aa430.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.iulue.exe.42922e8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ZWyrFp7WBM.exe.4582410.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ZWyrFp7WBM.exe.45aa430.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.2105135894.0000000003274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2105135894.000000000326C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1588947463.000000000251C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1588947463.0000000002524000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1588947463.00000000024F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2105135894.0000000003241000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1576277029.0000000000192000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1149953119.000000000456D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1620032141.0000000004061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1620032141.0000000003AC9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ZWyrFp7WBM.exe PID: 7096, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6680, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: iulue.exe PID: 3844, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 1316, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 5.2.iulue.exe.44d4100.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.InstallUtil.exe.190000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.iulue.exe.44d4100.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ZWyrFp7WBM.exe.45aa430.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.iulue.exe.42922e8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ZWyrFp7WBM.exe.4582410.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ZWyrFp7WBM.exe.45aa430.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.1588947463.00000000024F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2105135894.0000000003241000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1576277029.0000000000192000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1149953119.000000000456D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1620032141.0000000004061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1620032141.0000000003AC9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ZWyrFp7WBM.exe PID: 7096, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6680, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: iulue.exe PID: 3844, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 1316, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 5.2.iulue.exe.44d4100.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.InstallUtil.exe.190000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.iulue.exe.44d4100.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ZWyrFp7WBM.exe.45aa430.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.iulue.exe.42922e8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ZWyrFp7WBM.exe.4582410.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.ZWyrFp7WBM.exe.45aa430.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000C.00000002.2105135894.0000000003274000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2105135894.000000000326C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1588947463.000000000251C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1588947463.0000000002524000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1588947463.00000000024F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.2105135894.0000000003241000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.1576277029.0000000000192000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1149953119.000000000456D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1149953119.0000000004797000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1620032141.0000000004061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.1620032141.0000000003AC9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ZWyrFp7WBM.exe PID: 7096, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6680, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: iulue.exe PID: 3844, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 1316, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information111
                      Scripting
                      Valid Accounts121
                      Windows Management Instrumentation
                      111
                      Scripting
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      2
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/Job1
                      DLL Side-Loading
                      211
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      Input Capture
                      24
                      System Information Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAt2
                      Registry Run Keys / Startup Folder
                      2
                      Registry Run Keys / Startup Folder
                      2
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      311
                      Security Software Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                      Software Packing
                      NTDS1
                      Process Discovery
                      Distributed Component Object Model1
                      Input Capture
                      2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets141
                      Virtualization/Sandbox Evasion
                      SSHKeylogging23
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Masquerading
                      Cached Domain Credentials1
                      Application Window Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                      Virtualization/Sandbox Evasion
                      DCSync1
                      System Network Configuration Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job211
                      Process Injection
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632364 Sample: ZWyrFp7WBM.exe Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 30 oshi.at 2->30 32 api.ipify.org 2->32 54 Suricata IDS alerts for network traffic 2->54 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 11 other signatures 2->60 8 ZWyrFp7WBM.exe 15 5 2->8         started        13 wscript.exe 1 2->13         started        signatures3 process4 dnsIp5 34 oshi.at 194.15.112.248, 443, 49685, 49692 INTERNATIONAL-HOSTING-SOLUTIONS-ASEUDCrouteGB Ukraine 8->34 24 C:\Users\user\AppData\Roaming\iulue.exe, PE32 8->24 dropped 26 C:\Users\user\...\iulue.exe:Zone.Identifier, ASCII 8->26 dropped 28 C:\Users\user\AppData\Roaming\...\iulue.vbs, ASCII 8->28 dropped 70 Drops VBS files to the startup folder 8->70 72 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->72 74 Writes to foreign memory regions 8->74 76 Injects a PE file into a foreign processes 8->76 15 InstallUtil.exe 14 2 8->15         started        78 Windows Scripting host queries suspicious COM object (likely to drop second stage) 13->78 19 iulue.exe 14 2 13->19         started        file6 signatures7 process8 dnsIp9 36 162.254.34.31, 49688, 49698, 587 VIVIDHOSTINGUS United States 15->36 38 api.ipify.org 104.26.12.205, 443, 49687, 49697 CLOUDFLARENETUS United States 15->38 40 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->40 42 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->42 44 Tries to steal Mail credentials (via file / registry access) 15->44 46 Antivirus detection for dropped file 19->46 48 Multi AV Scanner detection for dropped file 19->48 50 Writes to foreign memory regions 19->50 52 Injects a PE file into a foreign processes 19->52 21 InstallUtil.exe 2 19->21         started        signatures10 process11 signatures12 62 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 21->62 64 Tries to steal Mail credentials (via file / registry access) 21->64 66 Tries to harvest and steal ftp login credentials 21->66 68 Tries to harvest and steal browser information (history, passwords, etc) 21->68

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.