Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rEthE93UEz.exe

Overview

General Information

Sample name:rEthE93UEz.exe
renamed because original name is a hash value
Original sample name:a6a795f876c61ec725db976d040ed4475fd4a329f40d238a68e793543c7f7bca.exe
Analysis ID:1633576
MD5:beaa591b5bddb646340fbd3f1bb0800e
SHA1:a09513da68f1eaf1b244956d9d67764381ada372
SHA256:a6a795f876c61ec725db976d040ed4475fd4a329f40d238a68e793543c7f7bca
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Deletes itself after installation
Drops executable to a common third party application directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses ipconfig to lookup or modify the Windows network settings
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses FTP
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • rEthE93UEz.exe (PID: 8064 cmdline: "C:\Users\user\Desktop\rEthE93UEz.exe" MD5: BEAA591B5BDDB646340FBD3F1BB0800E)
    • cmd.exe (PID: 7272 cmdline: "C:\Windows\System32\cmd.exe" /c ipconfig /release MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • ipconfig.exe (PID: 7452 cmdline: ipconfig /release MD5: 3A3B9A5E00EF6A3F83BF300E2B6B67BB)
    • cvtres.exe (PID: 1372 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
    • powershell.exe (PID: 5096 cmdline: "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\rEthE93UEz.exe' -Force MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • adobe.exe (PID: 6032 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
    • conhost.exe (PID: 1204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • adobe.exe (PID: 5644 cmdline: "C:\Users\user\AppData\Roaming\adobe\adobe.exe" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
    • conhost.exe (PID: 1076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_dod", "Password": "Doll900@@"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.3051812008.0000000002617000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000000B.00000002.3051812008.0000000002617000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000B.00000002.3051812008.00000000025C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000B.00000002.3051812008.00000000025C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1465251621.0000000005610000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            Click to see the 6 entries
            SourceRuleDescriptionAuthorStrings
            0.2.rEthE93UEz.exe.5610000.7.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.rEthE93UEz.exe.5610000.7.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c ipconfig /release, CommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\rEthE93UEz.exe", ParentImage: C:\Users\user\Desktop\rEthE93UEz.exe, ParentProcessId: 8064, ParentProcessName: rEthE93UEz.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release, ProcessId: 7272, ProcessName: cmd.exe
                Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c ipconfig /release, CommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\rEthE93UEz.exe", ParentImage: C:\Users\user\Desktop\rEthE93UEz.exe, ParentProcessId: 8064, ParentProcessName: rEthE93UEz.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release, ProcessId: 7272, ProcessName: cmd.exe
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\adobe\adobe.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe, ProcessId: 1372, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adobe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\rEthE93UEz.exe' -Force, CommandLine: "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\rEthE93UEz.exe' -Force, CommandLine|base64offset|contains: Jy, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\rEthE93UEz.exe", ParentImage: C:\Users\user\Desktop\rEthE93UEz.exe, ParentProcessId: 8064, ParentProcessName: rEthE93UEz.exe, ProcessCommandLine: "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\rEthE93UEz.exe' -Force, ProcessId: 5096, ProcessName: powershell.exe
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: conhost.exe.524.13.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://s4.serv00.com", "Username": "f2241_dod", "Password": "Doll900@@"}
                Source: rEthE93UEz.exeVirustotal: Detection: 63%Perma Link
                Source: rEthE93UEz.exeReversingLabs: Detection: 65%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A38FA CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptDestroyHash,CryptGetHashParam,CryptDestroyHash,14_2_006A38FA
                Source: rEthE93UEz.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49725 version: TLS 1.2
                Source: rEthE93UEz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: rEthE93UEz.exe, 00000000.00000002.1465047064.0000000005510000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003BC8000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: cvtres_clr.pdb source: adobe.exe, adobe.exe, 0000000E.00000002.1569430164.00000000006A1000.00000020.00000001.01000000.0000000A.sdmp, adobe.exe, 00000010.00000000.1648678720.00000000006A1000.00000020.00000001.01000000.0000000A.sdmp, adobe.exe.11.dr
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: rEthE93UEz.exe, rEthE93UEz.exe, 00000000.00000002.1465047064.0000000005510000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003BC8000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: cvtres_clr.pdbGCTL source: adobe.exe, 0000000E.00000002.1569430164.00000000006A1000.00000020.00000001.01000000.0000000A.sdmp, adobe.exe, 00000010.00000000.1648678720.00000000006A1000.00000020.00000001.01000000.0000000A.sdmp, adobe.exe.11.dr
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: rEthE93UEz.exe, 00000000.00000002.1465541997.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003C8F000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: rEthE93UEz.exe, 00000000.00000002.1465541997.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003C8F000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A31AE wcsncpy_s,wcsncat_s,GetEnvironmentVariableW,DecodePointer,GetModuleHandleW,GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetEnvironmentVariableW,SetThreadPreferredUILanguages,GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetUserDefaultUILanguage,_itow_s,wcsncpy_s,wcsncat_s,FindFirstFileW,GetLastError,_sscanf_s,wcsncat_s,wcsncat_s,wcsncat_s,LoadLibraryExW,FindNextFileW,FindClose,wcscpy_s,14_2_006A31AE
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_0527058C
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_05270598
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 4x nop then jmp 054DE618h0_2_054DE560
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 4x nop then jmp 054D1400h0_2_054D0E48
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 4x nop then jmp 054D1400h0_2_054D0E48
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 4x nop then jmp 054FE459h0_2_054FE270
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 4x nop then jmp 054FFAEFh0_2_054FFDAE
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 4x nop then jmp 054FFAEFh0_2_054FFB63
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 4x nop then jmp 054FE459h0_2_054FE260
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 4x nop then jmp 054FFAEFh0_2_054FFA7C
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 4x nop then jmp 054FFAEFh0_2_054FFA88
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_05815DA8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_05815DA0
                Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                Source: Joe Sandbox ViewIP Address: 213.189.52.181 213.189.52.181
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownFTP traffic detected: 213.189.52.181:21 -> 192.168.2.4:49726 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 13:53. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 13:53. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 4 of 150 allowed.220-Local time is now 13:53. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 15 minutes of inactivity.
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                Source: global trafficDNS traffic detected: DNS query: s4.serv00.com
                Source: rEthE93UEz.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                Source: rEthE93UEz.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                Source: rEthE93UEz.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                Source: rEthE93UEz.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                Source: rEthE93UEz.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                Source: rEthE93UEz.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                Source: rEthE93UEz.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                Source: rEthE93UEz.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                Source: rEthE93UEz.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                Source: powershell.exe, 0000000C.00000002.1570288372.000000000573C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: rEthE93UEz.exeString found in binary or memory: http://ocsp.digicert.com0
                Source: rEthE93UEz.exeString found in binary or memory: http://ocsp.digicert.com0A
                Source: rEthE93UEz.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: rEthE93UEz.exeString found in binary or memory: http://ocsp.digicert.com0X
                Source: powershell.exe, 0000000C.00000002.1556273204.0000000004825000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1555229472.0000000002DED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: cvtres.exe, 0000000B.00000002.3051812008.000000000264A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s4.serv00.com
                Source: rEthE93UEz.exe, 00000000.00000002.1446407826.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 0000000B.00000002.3051812008.00000000025C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1556273204.00000000046D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 0000000C.00000002.1556273204.0000000004825000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1555229472.0000000002DED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: rEthE93UEz.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: cvtres.exe, 0000000B.00000002.3051812008.00000000025C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                Source: powershell.exe, 0000000C.00000002.1556273204.00000000046D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                Source: cvtres.exe, 0000000B.00000002.3051812008.00000000025C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: cvtres.exe, 0000000B.00000002.3051812008.00000000025C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: cvtres.exe, 0000000B.00000002.3051812008.00000000025C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                Source: powershell.exe, 0000000C.00000002.1570288372.000000000573C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 0000000C.00000002.1570288372.000000000573C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 0000000C.00000002.1570288372.000000000573C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 0000000C.00000002.1556273204.0000000004825000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1555229472.0000000002DED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: rEthE93UEz.exe, 00000000.00000002.1465541997.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003C8F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                Source: rEthE93UEz.exe, 00000000.00000002.1465541997.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003C8F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                Source: rEthE93UEz.exe, 00000000.00000002.1465541997.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003C8F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                Source: powershell.exe, 0000000C.00000002.1573895446.000000000714F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.micr:
                Source: powershell.exe, 0000000C.00000002.1556273204.00000000049AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                Source: powershell.exe, 0000000C.00000002.1570288372.000000000573C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: rEthE93UEz.exe, 00000000.00000002.1465541997.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003C8F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: rEthE93UEz.exe, 00000000.00000002.1446407826.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1465541997.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003C8F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: rEthE93UEz.exe, 00000000.00000002.1465541997.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003C8F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                Source: rEthE93UEz.exeString found in binary or memory: https://tools.ietf.org/html/rfc4253#section-4.2
                Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49725 version: TLS 1.2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_05563140 NtResumeThread,0_2_05563140
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_05516E5B0_2_05516E5B
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_028719380_2_02871938
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_02871BC00_2_02871BC0
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_02872BFA0_2_02872BFA
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_02871B650_2_02871B65
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_028718FB0_2_028718FB
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_0287784A0_2_0287784A
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_028726680_2_02872668
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_028726780_2_02872678
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_02871C230_2_02871C23
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_052755200_2_05275520
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_0527942B0_2_0527942B
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_0527DA080_2_0527DA08
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_05277AB70_2_05277AB7
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_0527FAF00_2_0527FAF0
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_052755100_2_05275510
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_05271E000_2_05271E00
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_05271E100_2_05271E10
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_0527D9F70_2_0527D9F7
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_05292A200_2_05292A20
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_052929D60_2_052929D6
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_053D00400_2_053D0040
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_053DC5950_2_053DC595
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_053D14080_2_053D1408
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_053DEF480_2_053DEF48
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_053D79F80_2_053D79F8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_053D79E80_2_053D79E8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_053D00060_2_053D0006
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_053D80AF0_2_053D80AF
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_053D13F90_2_053D13F9
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A6E780_2_054A6E78
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A6ED80_2_054A6ED8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A1EF80_2_054A1EF8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A04480_2_054A0448
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A24000_2_054A2400
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A041F0_2_054A041F
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A1F6F0_2_054A1F6F
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A1F640_2_054A1F64
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A1FDA0_2_054A1FDA
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A1FF80_2_054A1FF8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A1EE80_2_054A1EE8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A21F40_2_054A21F4
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A201C0_2_054A201C
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A20170_2_054A2017
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A1A600_2_054A1A60
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054AB2780_2_054AB278
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A1A700_2_054A1A70
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054A22850_2_054A2285
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054DC5E80_2_054DC5E8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054DEF380_2_054DEF38
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_057377680_2_05737768
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_057317510_2_05731751
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_0573A6C00_2_0573A6C0
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_057361F80_2_057361F8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_057362870_2_05736287
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_0573D9F00_2_0573D9F0
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_05739A110_2_05739A11
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_057364F50_2_057364F5
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_057377C80_2_057377C8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_0573A6B00_2_0573A6B0
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_057361E80_2_057361E8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_057300400_2_05730040
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_0573003A0_2_0573003A
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_0573F0080_2_0573F008
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_0573DD270_2_0573DD27
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_057368180_2_05736818
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_0577E7580_2_0577E758
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_058134780_2_05813478
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_0581A9280_2_0581A928
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_05819AF80_2_05819AF8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_058195A80_2_058195A8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_058154280_2_05815428
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_058154380_2_05815438
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_058100400_2_05810040
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_058153D90_2_058153D9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_009990F811_2_009990F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0099A21011_2_0099A210
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0099C9EF11_2_0099C9EF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0099692011_2_00996920
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_00999D1011_2_00999D10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0099503511_2_00995035
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0099506011_2_00995060
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0099A20F11_2_0099A20F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0099A3F011_2_0099A3F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0099944011_2_00999440
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_009955D811_2_009955D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_009955D711_2_009955D7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0099691F11_2_0099691F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0099294811_2_00992948
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0099294711_2_00992947
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0099CC6211_2_0099CC62
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_06055A2611_2_06055A26
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_06055E2811_2_06055E28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609768011_2_06097680
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609AAD011_2_0609AAD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609D2F011_2_0609D2F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609D7B011_2_0609D7B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_060993B011_2_060993B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609E3C811_2_0609E3C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609004011_2_06090040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609CCD011_2_0609CCD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609512811_2_06095128
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609217811_2_06092178
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609767A11_2_0609767A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609A29811_2_0609A298
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_060982C011_2_060982C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609AAC011_2_0609AAC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_060982D011_2_060982D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609EEF811_2_0609EEF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_06099B3811_2_06099B38
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_06098B8011_2_06098B80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609E3B911_2_0609E3B9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609000711_2_06090007
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609C44811_2_0609C448
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609B06D11_2_0609B06D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609C88811_2_0609C888
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609511D11_2_0609511D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_06091D2011_2_06091D20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609BD5011_2_0609BD50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0609B99811_2_0609B998
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_061DBC9811_2_061DBC98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_061D6BAC11_2_061D6BAC
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00B0136512_2_00B01365
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00B0187D12_2_00B0187D
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A31AE14_2_006A31AE
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\Adobe\adobe.exe E4DBDBF7888EA96F3F8AA5C4C7F2BCF6E57D724DD8194FE5F35B673C6EF724EA
                Source: rEthE93UEz.exeStatic PE information: invalid certificate
                Source: rEthE93UEz.exeBinary or memory string: OriginalFilename vs rEthE93UEz.exe
                Source: rEthE93UEz.exe, 00000000.00000002.1465047064.0000000005510000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs rEthE93UEz.exe
                Source: rEthE93UEz.exe, 00000000.00000000.1198301342.000000000071D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCjhnjtqsmzn.exe< vs rEthE93UEz.exe
                Source: rEthE93UEz.exe, 00000000.00000002.1446407826.0000000002A21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs rEthE93UEz.exe
                Source: rEthE93UEz.exe, 00000000.00000002.1465541997.00000000056A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs rEthE93UEz.exe
                Source: rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003C8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs rEthE93UEz.exe
                Source: rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003C8F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea9d26a1c-7dc5-441c-98a8-6dd01f6d79df.exe4 vs rEthE93UEz.exe
                Source: rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003A21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs rEthE93UEz.exe
                Source: rEthE93UEz.exe, 00000000.00000002.1446407826.0000000002B6B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamea9d26a1c-7dc5-441c-98a8-6dd01f6d79df.exe4 vs rEthE93UEz.exe
                Source: rEthE93UEz.exe, 00000000.00000002.1445269942.0000000000BAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs rEthE93UEz.exe
                Source: rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003BC8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs rEthE93UEz.exe
                Source: rEthE93UEz.exe, 00000000.00000002.1462761603.0000000005100000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameEkmhivcrpkp.dll" vs rEthE93UEz.exe
                Source: rEthE93UEz.exeBinary or memory string: OriginalFilenameCjhnjtqsmzn.exe< vs rEthE93UEz.exe
                Source: rEthE93UEz.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@15/5@2/2
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A4D81 __p__wpgmptr,_wsplitpath_s,_wmakepath_s,wcsncat_s,FindResourceExW,LoadResource,14_2_006A4D81
                Source: C:\Users\user\Desktop\rEthE93UEz.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rEthE93UEz.exe.logJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1076:120:WilError_03
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1204:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:524:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7312:120:WilError_03
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_waeauvox.5vw.ps1Jump to behavior
                Source: rEthE93UEz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: rEthE93UEz.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\rEthE93UEz.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: rEthE93UEz.exeVirustotal: Detection: 63%
                Source: rEthE93UEz.exeReversingLabs: Detection: 65%
                Source: unknownProcess created: C:\Users\user\Desktop\rEthE93UEz.exe "C:\Users\user\Desktop\rEthE93UEz.exe"
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /release
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /release
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\rEthE93UEz.exe' -Force
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\Adobe\adobe.exe "C:\Users\user\AppData\Roaming\adobe\adobe.exe"
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /releaseJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"Jump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\rEthE93UEz.exe' -ForceJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /releaseJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: rEthE93UEz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: rEthE93UEz.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: rEthE93UEz.exeStatic file information: File size 3232672 > 1048576
                Source: rEthE93UEz.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2b7800
                Source: rEthE93UEz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: rEthE93UEz.exe, 00000000.00000002.1465047064.0000000005510000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003BC8000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: cvtres_clr.pdb source: adobe.exe, adobe.exe, 0000000E.00000002.1569430164.00000000006A1000.00000020.00000001.01000000.0000000A.sdmp, adobe.exe, 00000010.00000000.1648678720.00000000006A1000.00000020.00000001.01000000.0000000A.sdmp, adobe.exe.11.dr
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: rEthE93UEz.exe, rEthE93UEz.exe, 00000000.00000002.1465047064.0000000005510000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003A21000.00000004.00000800.00020000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003BC8000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: cvtres_clr.pdbGCTL source: adobe.exe, 0000000E.00000002.1569430164.00000000006A1000.00000020.00000001.01000000.0000000A.sdmp, adobe.exe, 00000010.00000000.1648678720.00000000006A1000.00000020.00000001.01000000.0000000A.sdmp, adobe.exe.11.dr
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: rEthE93UEz.exe, 00000000.00000002.1465541997.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003C8F000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: rEthE93UEz.exe, 00000000.00000002.1465541997.00000000056A0000.00000004.08000000.00040000.00000000.sdmp, rEthE93UEz.exe, 00000000.00000002.1460978713.0000000003C8F000.00000004.00000800.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: 0.2.rEthE93UEz.exe.56a0000.8.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                Source: 0.2.rEthE93UEz.exe.56a0000.8.raw.unpack, ListDecorator.cs.Net Code: Read
                Source: 0.2.rEthE93UEz.exe.56a0000.8.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                Source: 0.2.rEthE93UEz.exe.56a0000.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                Source: 0.2.rEthE93UEz.exe.56a0000.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                Source: Yara matchFile source: 0.2.rEthE93UEz.exe.5610000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rEthE93UEz.exe.5610000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.1465251621.0000000005610000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1446407826.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rEthE93UEz.exe PID: 8064, type: MEMORYSTR
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_028724DF push eax; retn 0107h0_2_028724E9
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054AF082 push eax; ret 0_2_054AF0E1
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054AAA70 push edi; ret 0_2_054AAA71
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054D7FB0 pushfd ; iretd 0_2_054D7FB1
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054FE580 pushad ; iretd 0_2_054FE58D
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_054F043A push eax; retf 0_2_054F0441
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0605AB6D push es; retf 11_2_0605AB74
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0605A8BA push es; iretd 11_2_0605A8D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0605A956 push es; ret 11_2_0605A95C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0605A9EE push es; ret 11_2_0605A9F4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_0605BDF5 push es; ret 11_2_0605BE5C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_06097670 pushad ; retf 11_2_06097675
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_06095EAD push es; retf 11_2_06095EF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_06096763 push 8BFFFFFDh; retf 11_2_0609676A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_06096433 push es; iretd 11_2_06096444
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_06096DCB push es; ret 11_2_06096DCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_061DB6A8 push E4060ACCh; ret 11_2_061DB6AD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_061D21B0 push es; ret 11_2_061D21C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_061D1D40 push es; ret 11_2_061D21C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 11_2_061D9B90 push es; ret 11_2_061D9BA0
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A58D6 push ecx; ret 14_2_006A58E9
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A5B82 push ecx; ret 14_2_006A5B95
                Source: 0.2.rEthE93UEz.exe.5100000.4.raw.unpack, ov2i5aK7PQASlgJYU51.csHigh entropy of concatenated method names: 'fPjK3HIxtX', 'rX6Kh0RT8R', 'M2VKqhEusT', 'feFKYu4747', 'TGsKH3tif7', 'ERRKCjWHt0', 'GyJKMVNWyX', 'htlKLArWU3', 'VyvKZRu9X2', 'RrBKILJQM9'

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile written: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /release
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile created: C:\Users\user\AppData\Roaming\Adobe\adobe.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run adobeJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile deleted: c:\users\user\desktop\rethe93uez.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\adobe\adobe.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: rEthE93UEz.exe PID: 8064, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: rEthE93UEz.exe, 00000000.00000002.1446407826.0000000002A21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\rEthE93UEz.exeMemory allocated: 2870000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeMemory allocated: 2A20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeMemory allocated: 4A20000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMemory allocated: 990000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMemory allocated: 25C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeMemory allocated: 45C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2729Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 946Jump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exe TID: 8084Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 1552Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 1552Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8116Thread sleep count: 2729 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8056Thread sleep count: 946 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1688Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6096Thread sleep count: 101 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6116Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_BIOS
                Source: C:\Windows\SysWOW64\ipconfig.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                Source: C:\Windows\SysWOW64\ipconfig.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\rEthE93UEz.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_ComputerSystem
                Source: C:\Windows\SysWOW64\ipconfig.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                Source: C:\Windows\SysWOW64\ipconfig.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A31AE wcsncpy_s,wcsncat_s,GetEnvironmentVariableW,DecodePointer,GetModuleHandleW,GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetEnvironmentVariableW,SetThreadPreferredUILanguages,GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetUserDefaultUILanguage,_itow_s,wcsncpy_s,wcsncat_s,FindFirstFileW,GetLastError,_sscanf_s,wcsncat_s,wcsncat_s,wcsncat_s,LoadLibraryExW,FindNextFileW,FindClose,wcscpy_s,14_2_006A31AE
                Source: C:\Users\user\Desktop\rEthE93UEz.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: rEthE93UEz.exe, 00000000.00000002.1446407826.0000000002A21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: rEthE93UEz.exe, 00000000.00000002.1446407826.0000000002A21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q 1:en-CH:Microsoft|VMWare|Virtual
                Source: rEthE93UEz.exe, 00000000.00000002.1446407826.0000000002A21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                Source: rEthE93UEz.exe, 00000000.00000002.1446407826.0000000002A21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q 1:en-CH:VMware|VIRTUAL|A M I|Xen
                Source: rEthE93UEz.exe, 00000000.00000002.1446407826.0000000002A21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                Source: cvtres.exe, 0000000B.00000003.1566056488.0000000000A87000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 0000000B.00000003.1565580570.0000000000A87000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 0000000B.00000003.1565393595.0000000000A87000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 0000000B.00000003.1565489463.0000000000A87000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 0000000B.00000003.1566143887.0000000000A87000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 0000000B.00000003.1565878691.0000000000A87000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 0000000B.00000003.1566226976.0000000000A87000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 0000000B.00000003.1565243557.0000000000A87000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 0000000B.00000002.3051423286.0000000000A87000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 0000000B.00000003.1565675524.0000000000A87000.00000004.00000020.00020000.00000000.sdmp, cvtres.exe, 0000000B.00000003.1565973053.0000000000A87000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\rEthE93UEz.exeCode function: 0_2_05815DA8 CheckRemoteDebuggerPresent,0_2_05815DA8
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A5682 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_006A5682
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A31AE wcsncpy_s,wcsncat_s,GetEnvironmentVariableW,DecodePointer,GetModuleHandleW,GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetEnvironmentVariableW,SetThreadPreferredUILanguages,GetModuleHandleW,GetProcAddress,EncodePointer,DecodePointer,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetUserDefaultUILanguage,_itow_s,wcsncpy_s,wcsncat_s,FindFirstFileW,GetLastError,_sscanf_s,wcsncat_s,wcsncat_s,wcsncat_s,LoadLibraryExW,FindNextFileW,FindClose,wcscpy_s,14_2_006A31AE
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A5374 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_006A5374
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A57E1 SetUnhandledExceptionFilter,14_2_006A57E1
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A5682 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_006A5682
                Source: C:\Users\user\Desktop\rEthE93UEz.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: rEthE93UEz.exe, IterableCalculator.csReference to suspicious API methods: AttachedBuffer.StoreVirtualAllocator(var1, num4, wantrule: true)
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, NativeMethods.csReference to suspicious API methods: OpenProcessToken(hProcess, desiredAccess, out var TokenHandle)
                Source: 0.2.rEthE93UEz.exe.3bc8a10.2.raw.unpack, ResourceReferenceValue.csReference to suspicious API methods: NativeMethods.LoadLibrary(ResourceFilePath)
                Source: C:\Users\user\Desktop\rEthE93UEz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 700000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 700000Jump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 702000Jump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 788000Jump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 78A000Jump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 5C7008Jump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /releaseJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"Jump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\Desktop\rEthE93UEz.exe' -ForceJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /releaseJump to behavior
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A590E cpuid 14_2_006A590E
                Source: C:\Users\user\Desktop\rEthE93UEz.exeQueries volume information: C:\Users\user\Desktop\rEthE93UEz.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rEthE93UEz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Adobe\adobe.exeCode function: 14_2_006A5573 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,14_2_006A5573
                Source: C:\Users\user\Desktop\rEthE93UEz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0000000B.00000002.3051812008.0000000002617000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3051812008.00000000025C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3051812008.000000000264A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 1372, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: Yara matchFile source: 0000000B.00000002.3051812008.0000000002617000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3051812008.00000000025C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 1372, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0000000B.00000002.3051812008.0000000002617000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3051812008.00000000025C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3051812008.000000000264A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 1372, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts131
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                1
                Exfiltration Over Alternative Protocol
                Abuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Native API
                1
                Scheduled Task/Job
                211
                Process Injection
                2
                Obfuscated Files or Information
                1
                Credentials in Registry
                2
                File and Directory Discovery
                Remote Desktop Protocol2
                Data from Local System
                21
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Scheduled Task/Job
                1
                Registry Run Keys / Startup Folder
                1
                Scheduled Task/Job
                1
                Software Packing
                Security Account Manager45
                System Information Discovery
                SMB/Windows Admin Shares1
                Email Collection
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                Registry Run Keys / Startup Folder
                1
                DLL Side-Loading
                NTDS351
                Security Software Discovery
                Distributed Component Object Model1
                Clipboard Data
                23
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                File Deletion
                LSA Secrets1
                Process Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                Masquerading
                Cached Domain Credentials161
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items161
                Virtualization/Sandbox Evasion
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job211
                Process Injection
                Proc Filesystem11
                System Network Configuration Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                Hidden Files and Directories
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1633576 Sample: rEthE93UEz.exe Startdate: 10/03/2025 Architecture: WINDOWS Score: 100 43 s4.serv00.com 2->43 45 api.ipify.org 2->45 59 Found malware configuration 2->59 61 Multi AV Scanner detection for submitted file 2->61 63 Yara detected AgentTesla 2->63 65 7 other signatures 2->65 8 rEthE93UEz.exe 4 2->8         started        12 adobe.exe 1 2->12         started        14 adobe.exe 1 2->14         started        signatures3 process4 file5 37 C:\Users\user\AppData\...\rEthE93UEz.exe.log, ASCII 8->37 dropped 67 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->67 69 Writes to foreign memory regions 8->69 71 Injects a PE file into a foreign processes 8->71 73 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 8->73 16 cvtres.exe 16 3 8->16         started        21 cmd.exe 1 8->21         started        23 powershell.exe 14 8->23         started        25 conhost.exe 12->25         started        27 conhost.exe 14->27         started        signatures6 process7 dnsIp8 39 s4.serv00.com 213.189.52.181, 21, 49726 ECO-ATMAN-PLECO-ATMAN-PL Poland 16->39 41 api.ipify.org 104.26.12.205, 443, 49725 CLOUDFLARENETUS United States 16->41 35 C:\Users\user\AppData\Roaming\...\adobe.exe, PE32 16->35 dropped 47 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->47 49 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 16->49 51 Tries to steal Mail credentials (via file / registry access) 16->51 57 4 other signatures 16->57 53 Uses ipconfig to lookup or modify the Windows network settings 21->53 29 conhost.exe 21->29         started        31 ipconfig.exe 1 21->31         started        55 Deletes itself after installation 23->55 33 conhost.exe 23->33         started        file9 signatures10 process11

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.