Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
I24560875423784426VTL.scr.exe

Overview

General Information

Sample name:I24560875423784426VTL.scr.exe
Analysis ID:1633485
MD5:4539008b22c34f4d80f51baa0c43636b
SHA1:9ab4f3edf89f7d177b7199d4ede51282f7c7064f
SHA256:cd543b888a62b49f39d1a167cbd02af8f7492ea660fc2c99935cd4c459a54de9
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Deletes itself after installation
Drops executable to a common third party application directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses ipconfig to lookup or modify the Windows network settings
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses FTP
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • I24560875423784426VTL.scr.exe (PID: 6524 cmdline: "C:\Users\user\Desktop\I24560875423784426VTL.scr.exe" MD5: 4539008B22C34F4D80F51BAA0C43636B)
    • cmd.exe (PID: 8268 cmdline: "C:\Windows\System32\cmd.exe" /c ipconfig /release MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 8276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • ipconfig.exe (PID: 8320 cmdline: ipconfig /release MD5: 3A3B9A5E00EF6A3F83BF300E2B6B67BB)
    • cvtres.exe (PID: 8712 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
    • powershell.exe (PID: 8728 cmdline: "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\I24560875423784426VTL.scr.exe' -Force MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • adobe.exe (PID: 9040 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
    • conhost.exe (PID: 9056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • adobe.exe (PID: 9132 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
    • conhost.exe (PID: 9140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_dod", "Password": "Ball900@@"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.1591178199.0000000005B70000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      0000000C.00000002.3758721884.00000000033DA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000C.00000002.3758721884.00000000033A7000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000C.00000002.3758721884.00000000033A7000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000004.00000002.1542101048.0000000002D01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              Click to see the 6 entries
              SourceRuleDescriptionAuthorStrings
              4.2.I24560875423784426VTL.scr.exe.5b70000.8.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                4.2.I24560875423784426VTL.scr.exe.5b70000.8.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

                  System Summary

                  barindex
                  Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c ipconfig /release, CommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\I24560875423784426VTL.scr.exe", ParentImage: C:\Users\user\Desktop\I24560875423784426VTL.scr.exe, ParentProcessId: 6524, ParentProcessName: I24560875423784426VTL.scr.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release, ProcessId: 8268, ProcessName: cmd.exe
                  Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c ipconfig /release, CommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\I24560875423784426VTL.scr.exe", ParentImage: C:\Users\user\Desktop\I24560875423784426VTL.scr.exe, ParentProcessId: 6524, ParentProcessName: I24560875423784426VTL.scr.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release, ProcessId: 8268, ProcessName: cmd.exe
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\adobe\adobe.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe, ProcessId: 8712, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adobe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\I24560875423784426VTL.scr.exe' -Force, CommandLine: "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\I24560875423784426VTL.scr.exe' -Force, CommandLine|base64offset|contains: Jy, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\I24560875423784426VTL.scr.exe", ParentImage: C:\Users\user\Desktop\I24560875423784426VTL.scr.exe, ParentProcessId: 6524, ParentProcessName: I24560875423784426VTL.scr.exe, ProcessCommandLine: "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\I24560875423784426VTL.scr.exe' -Force, ProcessId: 8728, ProcessName: powershell.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-10T12:12:26.447179+010020299271A Network Trojan was detected192.168.2.549715213.189.52.18121TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-10T12:12:27.019672+010028555421A Network Trojan was detected192.168.2.549716213.189.52.18163257TCP
                  2025-03-10T12:12:27.025090+010028555421A Network Trojan was detected192.168.2.549716213.189.52.18163257TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: I24560875423784426VTL.scr.exe.6524.4.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_dod", "Password": "Ball900@@"}
                  Source: I24560875423784426VTL.scr.exeVirustotal: Detection: 70%Perma Link
                  Source: I24560875423784426VTL.scr.exeReversingLabs: Detection: 68%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_008038FA CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptDestroyHash,CryptGetHashParam,CryptDestroyHash,15_2_008038FA
                  Source: I24560875423784426VTL.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49714 version: TLS 1.2
                  Source: I24560875423784426VTL.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: I24560875423784426VTL.scr.exe, 00000004.00000002.1581584746.0000000003D01000.00000004.00000800.00020000.00000000.sdmp, I24560875423784426VTL.scr.exe, 00000004.00000002.1592565469.0000000006330000.00000004.08000000.00040000.00000000.sdmp, I24560875423784426VTL.scr.exe, 00000004.00000002.1581584746.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: cvtres_clr.pdb source: adobe.exe, adobe.exe, 0000000F.00000000.1705437493.0000000000801000.00000020.00000001.01000000.00000008.sdmp, adobe.exe, 00000011.00000002.1787971450.0000000000801000.00000020.00000001.01000000.00000008.sdmp, adobe.exe.12.dr
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: I24560875423784426VTL.scr.exe, 00000004.00000002.1581584746.0000000003D01000.00000004.00000800.00020000.00000000.sdmp, I24560875423784426VTL.scr.exe, 00000004.00000002.1592565469.0000000006330000.00000004.08000000.00040000.00000000.sdmp, I24560875423784426VTL.scr.exe, 00000004.00000002.1581584746.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: cvtres_clr.pdbGCTL source: adobe.exe, 0000000F.00000000.1705437493.0000000000801000.00000020.00000001.01000000.00000008.sdmp, adobe.exe, 00000011.00000002.1787971450.0000000000801000.00000020.00000001.01000000.00000008.sdmp, adobe.exe.12.dr
                  Source: Binary string: protobuf-net.pdbSHA256}Lq source: I24560875423784426VTL.scr.exe, 00000004.00000002.1591631852.0000000005C00000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdb source: I24560875423784426VTL.scr.exe, 00000004.00000002.1591631852.0000000005C00000.00000004.08000000.00040000.00000000.sdmp
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_008031AE wcsncpy_s,wcsncat_s,GetEnvironmentVariableW,DecodePointer,GetModuleHandleW,GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetEnvironmentVariableW,SetThreadPreferredUILanguages,GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetUserDefaultUILanguage,_itow_s,wcsncpy_s,wcsncat_s,FindFirstFileW,GetLastError,_sscanf_s,wcsncat_s,wcsncat_s,wcsncat_s,LoadLibraryExW,FindNextFileW,FindClose,wcscpy_s,15_2_008031AE
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4x nop then jmp 06854FA8h4_2_06854EE9
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4x nop then jmp 06854FA8h4_2_06854EF0

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49716 -> 213.189.52.181:63257
                  Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.5:49715 -> 213.189.52.181:21
                  Source: global trafficTCP traffic: 192.168.2.5:49716 -> 213.189.52.181:63257
                  Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                  Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                  Source: Joe Sandbox ViewIP Address: 213.189.52.181 213.189.52.181
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownFTP traffic detected: 213.189.52.181:21 -> 192.168.2.5:49715 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 150 allowed.220-Local time is now 12:12. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 150 allowed.220-Local time is now 12:12. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 7 of 150 allowed.220-Local time is now 12:12. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                  Source: global trafficDNS traffic detected: DNS query: s4.serv00.com
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                  Source: powershell.exe, 0000000D.00000002.1658838607.000000000607E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://ocsp.digicert.com0
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://ocsp.digicert.com0A
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://ocsp.digicert.com0C
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://ocsp.digicert.com0X
                  Source: powershell.exe, 0000000D.00000002.1650570116.0000000005165000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: cvtres.exe, 0000000C.00000002.3758721884.00000000033DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s4.serv00.com
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1542101048.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 0000000C.00000002.3758721884.0000000003351000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.1650570116.0000000005011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 0000000D.00000002.1650570116.0000000005165000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: I24560875423784426VTL.scr.exeString found in binary or memory: http://www.digicert.com/CPS0
                  Source: cvtres.exe, 0000000C.00000002.3758721884.0000000003351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: powershell.exe, 0000000D.00000002.1650570116.0000000005011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                  Source: cvtres.exe, 0000000C.00000002.3758721884.0000000003351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                  Source: cvtres.exe, 0000000C.00000002.3758721884.0000000003351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                  Source: cvtres.exe, 0000000C.00000002.3758721884.0000000003351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                  Source: powershell.exe, 0000000D.00000002.1658838607.000000000607E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 0000000D.00000002.1658838607.000000000607E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 0000000D.00000002.1658838607.000000000607E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: powershell.exe, 0000000D.00000002.1650570116.0000000005165000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1591631852.0000000005C00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1581584746.0000000003D01000.00000004.00000800.00020000.00000000.sdmp, I24560875423784426VTL.scr.exe, 00000004.00000002.1591631852.0000000005C00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1591631852.0000000005C00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                  Source: powershell.exe, 0000000D.00000002.1658838607.000000000607E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1591631852.0000000005C00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1542101048.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, I24560875423784426VTL.scr.exe, 00000004.00000002.1591631852.0000000005C00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1591631852.0000000005C00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                  Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49714 version: TLS 1.2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_0685A3A8 NtResumeThread,4_2_0685A3A8
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_0685A3A0 NtResumeThread,4_2_0685A3A0
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_0128EC304_2_0128EC30
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_063DF5D04_2_063DF5D0
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_063DF8D04_2_063DF8D0
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_063DE5784_2_063DE578
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_063C00064_2_063C0006
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_063C00404_2_063C0040
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_063DDFF84_2_063DDFF8
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_068533B84_2_068533B8
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_0685425F4_2_0685425F
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_068533AA4_2_068533AA
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_068558B94_2_068558B9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_016093C012_2_016093C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_0160A4D812_2_0160A4D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_0160970812_2_01609708
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_0160699C12_2_0160699C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_016058C812_2_016058C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_01606BC812_2_01606BC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_0160CB9012_2_0160CB90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_01609FD812_2_01609FD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_0160A4C812_2_0160A4C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_016054CD12_2_016054CD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_0160A66212_2_0160A662
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_01606BBA12_2_01606BBA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_01606D7D12_2_01606D7D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_0160DDCC12_2_0160DDCC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_01602CC812_2_01602CC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_01602CB812_2_01602CB8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF5FE012_2_06CF5FE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF64C112_2_06CF64C1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF5BD112_2_06CF5BD1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF665312_2_06CF6653
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3AA8012_2_06D3AA80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3D2A912_2_06D3D2A9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3760812_2_06D37608
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3E39012_2_06D3E390
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3935812_2_06D39358
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3D77012_2_06D3D770
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3CC8012_2_06D3CC80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3004012_2_06D30040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3515012_2_06D35150
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3217112_2_06D32171
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D39AD012_2_06D39AD0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3EEC012_2_06D3EEC0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D39AE012_2_06D39AE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3A25012_2_06D3A250
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3825812_2_06D38258
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3AA7012_2_06D3AA70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3826812_2_06D38268
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3E38112_2_06D3E381
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D38B2012_2_06D38B20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3C84012_2_06D3C840
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3C40012_2_06D3C400
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3B02012_2_06D3B020
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D375F812_2_06D375F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3514012_2_06D35140
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3B94812_2_06D3B948
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D3BD0812_2_06D3BD08
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06D31D3812_2_06D31D38
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_008031AE15_2_008031AE
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\Adobe\adobe.exe E4DBDBF7888EA96F3F8AA5C4C7F2BCF6E57D724DD8194FE5F35B673C6EF724EA
                  Source: I24560875423784426VTL.scr.exeStatic PE information: invalid certificate
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1581584746.0000000003D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs I24560875423784426VTL.scr.exe
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1581584746.0000000003D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs I24560875423784426VTL.scr.exe
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1592565469.0000000006330000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs I24560875423784426VTL.scr.exe
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1542101048.0000000002E5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea9d26a1c-7dc5-441c-98a8-6dd01f6d79df.exe4 vs I24560875423784426VTL.scr.exe
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1581584746.0000000003FE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea9d26a1c-7dc5-441c-98a8-6dd01f6d79df.exe4 vs I24560875423784426VTL.scr.exe
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1581584746.0000000003E3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs I24560875423784426VTL.scr.exe
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1542101048.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs I24560875423784426VTL.scr.exe
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1591631852.0000000005C00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs I24560875423784426VTL.scr.exe
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000000.1275748859.00000000009D7000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameSjyiytmsh.exe< vs I24560875423784426VTL.scr.exe
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1540897675.000000000114E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs I24560875423784426VTL.scr.exe
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1586257836.0000000005580000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSuvullvlnme.dll" vs I24560875423784426VTL.scr.exe
                  Source: I24560875423784426VTL.scr.exeBinary or memory string: OriginalFilenameSjyiytmsh.exe< vs I24560875423784426VTL.scr.exe
                  Source: I24560875423784426VTL.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: I24560875423784426VTL.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: I24560875423784426VTL.scr.exe, -.csCryptographic APIs: 'CreateDecryptor'
                  Source: I24560875423784426VTL.scr.exe, Ggbfipdjj.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, d3uH0APqWrY7Y5OEguf.csCryptographic APIs: 'CreateDecryptor'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, d3uH0APqWrY7Y5OEguf.csCryptographic APIs: 'CreateDecryptor'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, yNzg.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, KNymkUU5gB.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, KNymkUU5gB.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3d05570.0.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3d05570.0.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3d05570.0.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3d05570.0.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3d05570.0.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                  Source: 4.2.I24560875423784426VTL.scr.exe.3d05570.0.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                  Source: 4.2.I24560875423784426VTL.scr.exe.3d05570.0.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                  Source: 4.2.I24560875423784426VTL.scr.exe.3d05570.0.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                  Source: 4.2.I24560875423784426VTL.scr.exe.3d05570.0.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                  Source: 4.2.I24560875423784426VTL.scr.exe.3d05570.0.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@15/5@2/2
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_00804D81 __p__wpgmptr,_wsplitpath_s,_wmakepath_s,wcsncat_s,FindResourceExW,LoadResource,15_2_00804D81
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\I24560875423784426VTL.scr.exe.logJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9056:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8744:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:9140:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8276:120:WilError_03
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_24mc5abg.tls.ps1Jump to behavior
                  Source: I24560875423784426VTL.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: I24560875423784426VTL.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: I24560875423784426VTL.scr.exeVirustotal: Detection: 70%
                  Source: I24560875423784426VTL.scr.exeReversingLabs: Detection: 68%
                  Source: unknownProcess created: C:\Users\user\Desktop\I24560875423784426VTL.scr.exe "C:\Users\user\Desktop\I24560875423784426VTL.scr.exe"
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /release
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /release
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\I24560875423784426VTL.scr.exe' -Force
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /releaseJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\I24560875423784426VTL.scr.exe' -ForceJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /releaseJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: I24560875423784426VTL.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: I24560875423784426VTL.scr.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: I24560875423784426VTL.scr.exeStatic file information: File size 1828768 > 1048576
                  Source: I24560875423784426VTL.scr.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x160c00
                  Source: I24560875423784426VTL.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: I24560875423784426VTL.scr.exe, 00000004.00000002.1581584746.0000000003D01000.00000004.00000800.00020000.00000000.sdmp, I24560875423784426VTL.scr.exe, 00000004.00000002.1592565469.0000000006330000.00000004.08000000.00040000.00000000.sdmp, I24560875423784426VTL.scr.exe, 00000004.00000002.1581584746.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: cvtres_clr.pdb source: adobe.exe, adobe.exe, 0000000F.00000000.1705437493.0000000000801000.00000020.00000001.01000000.00000008.sdmp, adobe.exe, 00000011.00000002.1787971450.0000000000801000.00000020.00000001.01000000.00000008.sdmp, adobe.exe.12.dr
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: I24560875423784426VTL.scr.exe, 00000004.00000002.1581584746.0000000003D01000.00000004.00000800.00020000.00000000.sdmp, I24560875423784426VTL.scr.exe, 00000004.00000002.1592565469.0000000006330000.00000004.08000000.00040000.00000000.sdmp, I24560875423784426VTL.scr.exe, 00000004.00000002.1581584746.0000000003E3D000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: cvtres_clr.pdbGCTL source: adobe.exe, 0000000F.00000000.1705437493.0000000000801000.00000020.00000001.01000000.00000008.sdmp, adobe.exe, 00000011.00000002.1787971450.0000000000801000.00000020.00000001.01000000.00000008.sdmp, adobe.exe.12.dr
                  Source: Binary string: protobuf-net.pdbSHA256}Lq source: I24560875423784426VTL.scr.exe, 00000004.00000002.1591631852.0000000005C00000.00000004.08000000.00040000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdb source: I24560875423784426VTL.scr.exe, 00000004.00000002.1591631852.0000000005C00000.00000004.08000000.00040000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, d3uH0APqWrY7Y5OEguf.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: I24560875423784426VTL.scr.exe, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                  Source: I24560875423784426VTL.scr.exe, Kfrucx.cs.Net Code: Bjdxrqf System.AppDomain.Load(byte[])
                  Source: 4.2.I24560875423784426VTL.scr.exe.3d05570.0.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                  Source: 4.2.I24560875423784426VTL.scr.exe.3d05570.0.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                  Source: 4.2.I24560875423784426VTL.scr.exe.3d05570.0.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                  Source: 4.2.I24560875423784426VTL.scr.exe.5c00000.9.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                  Source: 4.2.I24560875423784426VTL.scr.exe.5c00000.9.raw.unpack, ListDecorator.cs.Net Code: Read
                  Source: 4.2.I24560875423784426VTL.scr.exe.5c00000.9.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                  Source: 4.2.I24560875423784426VTL.scr.exe.5c00000.9.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                  Source: 4.2.I24560875423784426VTL.scr.exe.5c00000.9.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                  Source: Yara matchFile source: 4.2.I24560875423784426VTL.scr.exe.5b70000.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.I24560875423784426VTL.scr.exe.5b70000.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.1591178199.0000000005B70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.1542101048.0000000002D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: I24560875423784426VTL.scr.exe PID: 6524, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_0685818B push es; ret 4_2_06858194
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF9EE1 push esi; iretd 12_2_06CF9EE2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CFBEB3 push es; retf 12_2_06CFBEB4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF349F push cs; iretd 12_2_06CF34A6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF8C44 push esi; retf 12_2_06CF8C45
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF347F push ss; iretd 12_2_06CF348A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF3477 push ebx; iretd 12_2_06CF3479
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF341F push ds; iretd 12_2_06CF342A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF3557 push es; iretd 12_2_06CF3564
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CFAA9B push FFFFFF8Bh; iretd 12_2_06CFAA9E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CFC271 push BA06CC41h; ret 12_2_06CFC281
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CFAA33 push es; iretd 12_2_06CFAA44
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF338B push cs; iretd 12_2_06CF339A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF33B3 push 00000020h; iretd 12_2_06CF33BA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF335F push cs; iretd 12_2_06CF339A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF3373 push es; retf 12_2_06CF3374
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CF3321 push ds; iretd 12_2_06CF3322
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 12_2_06CFA967 pushfd ; iretd 12_2_06CFA96A
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_04E44C68 push eax; retf 0007h13_2_04E44CA2
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_04E46DB8 push edx; ret 13_2_04E46DBA
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_00805B82 push ecx; ret 15_2_00805B95
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_008058D6 push ecx; ret 15_2_008058E9
                  Source: I24560875423784426VTL.scr.exeStatic PE information: section name: .text entropy: 7.925742009756242
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, d3uH0APqWrY7Y5OEguf.csHigh entropy of concatenated method names: 'xd3B06OooqF2afHpQeM', 'SMh6xMO8L9umik02wQT', 'dUPD4QkjJb', 'vh0ry9Sq2v', 'HIGDuiWDOD', 'eK9D7FL4um', 'AAjD5YirGJ', 'pqNDhcId39', 'OQHMUjMF9t', 'mkXPQSYSva'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, ACm7jjY.csHigh entropy of concatenated method names: 'slLwn6svMXX54BUuJBL', 'rrHjH6sNtPALt0pfaHW', 'Dispose', 'lW8w7wsb0LxRRRlDTuO', 'jHBnjasWM2Vjc1modIl', 'Vgx3MksIfnF87uUlG7L', 'mk0ODPskyXIPMnQg7Bx', 'BCryptOpenAlgorithmProvider', 'BCryptCloseAlgorithmProvider', 'BCryptGetProperty'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, LPE.csHigh entropy of concatenated method names: 'dt0Lwis3xoELuE465OX', 'PtdLPOsFbJZBYA4I91M', 'XEQGghS', 'Z8hm', 'p11I94S0g', '_0VKfK', 'gY9RE', 'GSroNjvW2I5', 'LN4zvkPh', 'V0vtG5lIu'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, MXRHvntBToZ.csHigh entropy of concatenated method names: 'ReleaseHandle', 'UixcjFJivQ0LxVFkIcH', 'gdv0nNJPqrOWOF3EgrB', 'RegOpenKeyEx', 'RegCloseKey', 'RegQueryValueEx', 'MpZQWZJDpd3y7ahR5AS', 'zu7lmFJ1ZeV98BdHWat', 'Grab', 'rZNPRFJTmWLBgHSb70O'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, i7QXmu7.csHigh entropy of concatenated method names: 'ujSolY0QUFfXNmHVc4Q', 'E3B1ko0c3GIMDEqgSde', 'e8YJUD0Kf8JesmsxT3Q', 'Q5xnhD0XPv2KyHEQhkj', 'Grab', 'gnFjGddpgR', 'TT5jePCDoO', 'LLFjuiZJVV', 'B0TN3Y0ktpg73bmbMsU', 'NhQLjo0qNpwHw5GQc4n'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, Nw5aBiDmXZW27GFt75j.csHigh entropy of concatenated method names: 'neEDtCLRxs', 'a4ZDysXtS3', 'tJlDoZWI0g', 'jCqD8aFt7y', 's4BDgYadnl', 'iu3DwuAiG2', 'xAlDUTGjxD', 'Hm4Dpu89Qm', 'VkGDfR9kPW', 'i45DLEuoSv'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, VHTE3UKlc.csHigh entropy of concatenated method names: 'dl9nyQV4h', 'qcWLK6CcZ', 'q14ldtMpv', 'mJvQSGarB', 'SvjcOtUgl', 'ERo61wtsL', 'AVYKIIfWC', 'gZQXSPTJv', 'sLDJEPHqcjdFeIdl3tw', 'RjcDhAHlGTfngI27Xdb'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, kneYsSjwsPimWBZTbcL.csHigh entropy of concatenated method names: 'lowiTSFkEy', 'DWxiE2tKEb', 'QhBiiIlqUA', 'QtliPl8MZI', 'q4MiDl4G0A', 'p3Si1MSWnb', 'b6NxCqJrG7HJmKOE4QM', 'UeiKe2JZX2YxJww1oF7', 'BpBjp0Qf72', 'KyYEVrJxwLbxxCKxo9o'
                  Source: 4.2.I24560875423784426VTL.scr.exe.3fe0868.3.raw.unpack, YlVZBuGdo.csHigh entropy of concatenated method names: 'vl7iGuvwdI', 'OOVieQsh8E', 'Mtciuw8bNc', 'RucaOhP4jP', 'Huymh3', 'MzT9IAqvVg', 'LYq0', 'yPGi76OoiW', 'Oiai5undmA', 'qqOihNkIme'
                  Source: 4.2.I24560875423784426VTL.scr.exe.5580000.6.raw.unpack, jRKB7eUSZywqcU8bvUk.csHigh entropy of concatenated method names: 'EPqU8XUtyX', 'AHhUqL4j1u', 'EncUySXgen', 'p29U55HMr6', 'sOTUbuNB4i', 'XUPULadMiM', 'RSOUAKHxkx', 'SfhU1ySSDF', 'YPCUrYWvlk', 'GyZUlVx6fo'

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile written: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /release
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile created: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile deleted: c:\users\user\desktop\i24560875423784426vtl.scr.exeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\adobe\adobe.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: I24560875423784426VTL.scr.exe PID: 6524, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1542101048.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeMemory allocated: 1280000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeMemory allocated: 2D00000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeMemory allocated: 4D00000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMemory allocated: 1600000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMemory allocated: 3350000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMemory allocated: 32A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 599891Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 599654Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 599546Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 599374Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598984Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598840Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598733Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598584Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598283Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597922Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597812Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597483Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596931Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596826Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596714Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596391Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596172Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596062Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595942Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595685Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595575Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595394Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595251Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595125Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594956Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594702Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594593Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594266Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594154Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 593938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 593813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 593688Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 593563Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 593453Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 593344Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindow / User API: threadDelayed 6665Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindow / User API: threadDelayed 3162Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4695Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5046Jump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exe TID: 7592Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep count: 34 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -599891s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8952Thread sleep count: 6665 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8952Thread sleep count: 3162 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -599766s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -599654s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -599546s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -599374s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -598984s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -598840s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -598733s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -598584s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -598283s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -598156s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -598031s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -597922s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -597812s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -597703s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -597594s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -597483s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -597375s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -597265s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -597156s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -597047s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -596931s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -596826s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -596714s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -596609s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -596500s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -596391s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -596281s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -596172s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -596062s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -595942s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -595813s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -595685s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -595575s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -595394s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -595251s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -595125s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -594956s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -594813s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -594702s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -594593s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -594484s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -594375s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -594266s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -594154s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -594047s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -593938s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -593813s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -593688s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -593563s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -593453s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 8948Thread sleep time: -593344s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8808Thread sleep count: 4695 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8804Thread sleep count: 5046 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8872Thread sleep time: -24903104499507879s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_008031AE wcsncpy_s,wcsncat_s,GetEnvironmentVariableW,DecodePointer,GetModuleHandleW,GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetEnvironmentVariableW,SetThreadPreferredUILanguages,GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetUserDefaultUILanguage,_itow_s,wcsncpy_s,wcsncat_s,FindFirstFileW,GetLastError,_sscanf_s,wcsncat_s,wcsncat_s,wcsncat_s,LoadLibraryExW,FindNextFileW,FindClose,wcscpy_s,15_2_008031AE
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 599891Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 599654Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 599546Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 599374Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598984Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598840Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598733Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598584Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598283Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 598031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597922Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597812Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597594Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597483Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 597047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596931Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596826Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596714Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596391Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596172Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 596062Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595942Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595685Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595575Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595394Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595251Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 595125Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594956Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594702Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594593Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594266Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594154Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 594047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 593938Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 593813Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 593688Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 593563Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 593453Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 593344Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: cvtres.exe, 0000000C.00000003.1594338064.0000000005A84000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 0000000C.00000003.1626328571.0000000005A7A000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 0000000C.00000002.3759925238.0000000005A7A000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 0000000C.00000003.1594113092.0000000005A67000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlly
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1542101048.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1542101048.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q 1:en-CH:Microsoft|VMWare|Virtual
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1542101048.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1542101048.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q 1:en-CH:VMware|VIRTUAL|A M I|Xen
                  Source: I24560875423784426VTL.scr.exe, 00000004.00000002.1542101048.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeCode function: 4_2_0685C210 LdrInitializeThunk,4_2_0685C210
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_00805682 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_00805682
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_008031AE wcsncpy_s,wcsncat_s,GetEnvironmentVariableW,DecodePointer,GetModuleHandleW,GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetEnvironmentVariableW,SetThreadPreferredUILanguages,GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetUserDefaultUILanguage,_itow_s,wcsncpy_s,wcsncat_s,FindFirstFileW,GetLastError,_sscanf_s,wcsncat_s,wcsncat_s,wcsncat_s,LoadLibraryExW,FindNextFileW,FindClose,wcscpy_s,15_2_008031AE
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_00805682 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_00805682
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_008057E1 SetUnhandledExceptionFilter,15_2_008057E1
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_00805374 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_00805374
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 402000Jump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 488000Jump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 48A000Jump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 117B008Jump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /releaseJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\I24560875423784426VTL.scr.exe' -ForceJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /releaseJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_0080590E cpuid 15_2_0080590E
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeQueries volume information: C:\Users\user\Desktop\I24560875423784426VTL.scr.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 15_2_00805573 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,15_2_00805573
                  Source: C:\Users\user\Desktop\I24560875423784426VTL.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 0000000C.00000002.3758721884.00000000033DA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.3758721884.00000000033A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.3758721884.0000000003351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 8712, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 0000000C.00000002.3758721884.00000000033A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.3758721884.0000000003351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 8712, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 0000000C.00000002.3758721884.00000000033DA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.3758721884.00000000033A7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.3758721884.0000000003351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 8712, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts131
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  1
                  Exfiltration Over Alternative Protocol
                  Abuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Scheduled Task/Job
                  1
                  Scheduled Task/Job
                  211
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  21
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt1
                  Registry Run Keys / Startup Folder
                  1
                  Scheduled Task/Job
                  3
                  Obfuscated Files or Information
                  Security Account Manager45
                  System Information Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                  Registry Run Keys / Startup Folder
                  22
                  Software Packing
                  NTDS251
                  Security Software Discovery
                  Distributed Component Object Model1
                  Clipboard Data
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets1
                  Process Discovery
                  SSHKeylogging23
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  File Deletion
                  Cached Domain Credentials161
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                  Masquerading
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job161
                  Virtualization/Sandbox Evasion
                  Proc Filesystem11
                  System Network Configuration Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt211
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                  Hidden Files and Directories
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1633485 Sample: I24560875423784426VTL.scr.exe Startdate: 10/03/2025 Architecture: WINDOWS Score: 100 43 s4.serv00.com 2->43 45 api.ipify.org 2->45 59 Suricata IDS alerts for network traffic 2->59 61 Found malware configuration 2->61 63 Multi AV Scanner detection for submitted file 2->63 65 8 other signatures 2->65 8 I24560875423784426VTL.scr.exe 4 2->8         started        12 adobe.exe 1 2->12         started        14 adobe.exe 1 2->14         started        signatures3 process4 file5 37 C:\...\I24560875423784426VTL.scr.exe.log, ASCII 8->37 dropped 67 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->67 69 Writes to foreign memory regions 8->69 71 Injects a PE file into a foreign processes 8->71 16 cvtres.exe 16 3 8->16         started        21 cmd.exe 1 8->21         started        23 powershell.exe 15 8->23         started        25 conhost.exe 12->25         started        27 conhost.exe 14->27         started        signatures6 process7 dnsIp8 39 s4.serv00.com 213.189.52.181, 21, 49715, 49716 ECO-ATMAN-PLECO-ATMAN-PL Poland 16->39 41 api.ipify.org 104.26.12.205, 443, 49714 CLOUDFLARENETUS United States 16->41 35 C:\Users\user\AppData\Roaming\...\adobe.exe, PE32 16->35 dropped 47 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->47 49 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 16->49 51 Tries to steal Mail credentials (via file / registry access) 16->51 57 4 other signatures 16->57 53 Uses ipconfig to lookup or modify the Windows network settings 21->53 29 conhost.exe 21->29         started        31 ipconfig.exe 1 21->31         started        55 Deletes itself after installation 23->55 33 conhost.exe 23->33         started        file9 signatures10 process11

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.