Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lZmUPfUitK.exe

Overview

General Information

Sample Name:lZmUPfUitK.exe
Analysis ID:652388
MD5:808c44b1b4e11b8b5428c05de17884c7
SHA1:7ae0a547f38f21b6035e1726bd4700d963ceb8a2
SHA256:70199c37ff74d3feebd76f55ef786284132979a9b8f14bf1180d1f6b30ebb6a3
Tags:exeXFilesStealer
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Writes to foreign memory regions
Modifies the context of a thread in another process (thread injection)
Yara detected Costura Assembly Loader
Encrypted powershell cmdline option found
Potential dropper URLs found in powershell memory
Injects a PE file into a foreign processes
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Yara signature match
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Creates a process in suspended mode (likely to inject code)
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

  • System is w10x64
  • lZmUPfUitK.exe (PID: 5532 cmdline: "C:\Users\user\Desktop\lZmUPfUitK.exe" MD5: 808C44B1B4E11B8B5428C05DE17884C7)
    • powershell.exe (PID: 5780 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA== MD5: 95000560239032BC68B4C2FDFCDEF913)
      • conhost.exe (PID: 6784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • InstallUtil.exe (PID: 3564 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe MD5: 6EE3F830099ADD53C26DF5739B44D608)
  • Dwdsyugg.exe (PID: 2416 cmdline: "C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe" MD5: 808C44B1B4E11B8B5428C05DE17884C7)
  • Dwdsyugg.exe (PID: 6344 cmdline: "C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe" MD5: 808C44B1B4E11B8B5428C05DE17884C7)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000F.00000002.632975548.000001ED0EEB1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    0000000F.00000002.634332225.000001ED27600000.00000004.00000001.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000017.00000002.637024650.000001C7FA110000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000017.00000002.637024650.000001C7FA110000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_zgRATDetects zgRATditekSHen
        • 0x5d47e:$s1: file:///
        • 0x5d3da:$s2: {11111-22222-10009-11112}
        • 0x5d40e:$s3: {11111-22222-50001-00000}
        • 0x5a0d5:$s4: get_Module
        • 0x5a1f1:$s5: Reverse
        • 0x5b8f4:$s6: BlockCopy
        • 0x5bf76:$s7: ReadByte
        • 0x5d492:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
        0000000F.00000002.633968857.000001ED1EFB0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          Click to see the 7 entries
          SourceRuleDescriptionAuthorStrings
          15.2.InstallUtil.exe.1ed0eedb9a8.1.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            15.2.InstallUtil.exe.1ed1ef60970.2.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              15.2.InstallUtil.exe.1ed27600000.6.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                15.2.InstallUtil.exe.1ed1ef38938.3.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  15.2.InstallUtil.exe.1ed0eedb9a8.1.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    Click to see the 10 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: lZmUPfUitK.exeVirustotal: Detection: 28%Perma Link
                    Source: lZmUPfUitK.exeReversingLabs: Detection: 30%
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeReversingLabs: Detection: 30%
                    Source: Binary string: protobuf-net.pdbSHA256 source: Dwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: Dwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmp

                    Networking

                    barindex
                    Source: powershell.exe, 00000007.00000002.501289931.0000015D1A27E000.00000004.00000800.00020000.00000000.sdmpString found in memory: http://schemas.microsoft.com/cmdlets-over-objects/2009/11:Version, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:DefaultNoun, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:InstanceCmdlets, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:StaticCmdlets, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:CmdletAdapterPrivateData
                    Source: powershell.exe, 00000007.00000002.501289931.0000015D1A27E000.00000004.00000800.00020000.00000000.sdmpString found in memory: http://schemas.microsoft.com/cmdlets-over-objects/2009/11:AllowEmptyCollection, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:AllowEmptyString, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:AllowNull, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:ValidateNotNull, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:ValidateNotNullOrEmpty, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:ValidateCount, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:ValidateLength, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:ValidateRange, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:ValidateSet, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:Obsolete
                    Source: powershell.exe, 00000007.00000002.501289931.0000015D1A27E000.00000004.00000800.00020000.00000000.sdmpString found in memory: http://schemas.microsoft.com/cmdlets-over-objects/2009/11:Type, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:MaxValueQuery, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:RegularQuery, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:ExcludeQuery, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:MinValueQuery
                    Source: powershell.exe, 00000007.00000002.513459906.0000015D1BD93000.00000004.00000800.00020000.00000000.sdmpString found in memory: http://schemas.microsoft.com/cmdlets-over-objects/2009/11:Type, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:MaxValueQuery, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:RegularQuery, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:ExcludeQuery, http://schemas.microsoft.com/cmdlets-over-objects/2009/11:MinValueQuery8Qp
                    Source: powershell.exe, 00000007.00000003.490179131.0000015D32195000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.517474109.0000015D32195000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: powershell.exe, 00000007.00000002.515256394.0000015D2A0D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: powershell.exe, 00000007.00000002.501289931.0000015D1A27E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: powershell.exe, 00000007.00000002.501289931.0000015D1A27E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                    Source: powershell.exe, 00000007.00000002.500098040.0000015D1A071000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000007.00000002.501289931.0000015D1A27E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                    Source: powershell.exe, 00000007.00000002.501289931.0000015D1A27E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: powershell.exe, 00000007.00000002.515256394.0000015D2A0D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000007.00000002.515256394.0000015D2A0D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000007.00000002.515256394.0000015D2A0D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: powershell.exe, 00000007.00000002.501289931.0000015D1A27E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: Dwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                    Source: Dwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                    Source: Dwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                    Source: powershell.exe, 00000007.00000002.515256394.0000015D2A0D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: Dwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: Dwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmp, Dwdsyugg.exe, 00000017.00000002.630424780.000001C780032000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: Dwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354

                    System Summary

                    barindex
                    Source: 23.2.Dwdsyugg.exe.1c7fa110000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.3.lZmUPfUitK.exe.1899a00cfa0.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 23.2.Dwdsyugg.exe.1c7fa110000.3.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.3.lZmUPfUitK.exe.1899a00cfa0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 00000017.00000002.637024650.000001C7FA110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
                    Source: Dwdsyugg.exe.0.drStatic PE information: No import functions for PE file found
                    Source: 23.2.Dwdsyugg.exe.1c7fa110000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.3.lZmUPfUitK.exe.1899a00cfa0.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 23.2.Dwdsyugg.exe.1c7fa110000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.3.lZmUPfUitK.exe.1899a00cfa0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 00000017.00000002.637024650.000001C7FA110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: lZmUPfUitK.exe, 00000000.00000003.528377603.000001899A14D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJhvvmuxqtjuqwklxvt.dll" vs lZmUPfUitK.exe
                    Source: lZmUPfUitK.exe, 00000000.00000003.527464350.0000018999FE4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJhvvmuxqtjuqwklxvt.dll" vs lZmUPfUitK.exe
                    Source: lZmUPfUitK.exe, 00000000.00000000.357528433.0000018988068000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamepm.exe4 vs lZmUPfUitK.exe
                    Source: lZmUPfUitK.exeBinary or memory string: OriginalFilenamepm.exe4 vs lZmUPfUitK.exe
                    Source: Dwdsyugg.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF859065DBA7_2_00007FF859065DBA
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF859065C057_2_00007FF859065C05
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8590682F87_2_00007FF8590682F8
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF85913463F7_2_00007FF85913463F
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8591332117_2_00007FF859133211
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeCode function: 15_2_00007FF8590812D815_2_00007FF8590812D8
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeCode function: 23_2_00007FF859072FF523_2_00007FF859072FF5
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeCode function: 23_2_00007FF85907FEDB23_2_00007FF85907FEDB
                    Source: Dwdsyugg.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: lZmUPfUitK.exeVirustotal: Detection: 28%
                    Source: lZmUPfUitK.exeReversingLabs: Detection: 30%
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeFile read: C:\Users\user\Desktop\lZmUPfUitK.exeJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: lZmUPfUitK.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\lZmUPfUitK.exe "C:\Users\user\Desktop\lZmUPfUitK.exe"
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe "C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe "C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe"
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==Jump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6784:120:WilError_01
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeFile created: C:\Users\user\AppData\Roaming\LwwaqbJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_noinjdo0.1qu.ps1Jump to behavior
                    Source: classification engineClassification label: mal88.troj.evad.winEXE@8/8@0/0
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: Binary string: protobuf-net.pdbSHA256 source: Dwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: Dwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: Yara matchFile source: 15.2.InstallUtil.exe.1ed0eedb9a8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.InstallUtil.exe.1ed1ef60970.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.InstallUtil.exe.1ed27600000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.InstallUtil.exe.1ed1ef38938.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.InstallUtil.exe.1ed0eedb9a8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.2.Dwdsyugg.exe.1c7fa110000.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.InstallUtil.exe.1ed1efb09a8.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.lZmUPfUitK.exe.1899a00cfa0.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 23.2.Dwdsyugg.exe.1c7fa110000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 15.2.InstallUtil.exe.1ed1ef38938.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.lZmUPfUitK.exe.1899a00cfa0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.632975548.000001ED0EEB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.634332225.000001ED27600000.00000004.00000001.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.637024650.000001C7FA110000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.633968857.000001ED1EFB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.633387548.000001ED1EEA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.528377603.000001899A14D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000017.00000002.630424780.000001C780032000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.527464350.0000018999FE4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: lZmUPfUitK.exe PID: 5532, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3564, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Dwdsyugg.exe PID: 6344, type: MEMORYSTR
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF85913702E push cs; retf 7_2_00007FF85913702F
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF859136BEA push edx; iretd 7_2_00007FF859136BEB
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeCode function: 15_2_00007FF859081073 push eax; iretd 15_2_00007FF8590810F1
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeCode function: 15_2_00007FF859083B05 push FFFFFFBEh; iretd 15_2_00007FF859083B07
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeCode function: 15_2_00007FF85908573A pushad ; ret 15_2_00007FF859085745
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeCode function: 23_2_00007FF859081C9E push ss; retf 23_2_00007FF859081C9F
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeCode function: 23_2_00007FF8590772FD push ebx; iretd 23_2_00007FF85907731A
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.998986893463506
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeFile created: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeJump to dropped file
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run DwdsyuggJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run DwdsyuggJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6662Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2821Jump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exe TID: 6516Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6496Thread sleep time: -23980767295822402s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe base: 140000000Jump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe base: 140002000Jump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe base: 140076000Jump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe base: C369AFC010Jump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeThread register set: target process: 3564Jump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess created: Base64 decoded Start-Sleep -Seconds 10; Set-MpPreference -ExclusionPath 'C:\'
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess created: Base64 decoded Start-Sleep -Seconds 10; Set-MpPreference -ExclusionPath 'C:\'Jump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeMemory written: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe base: 140000000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==Jump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeQueries volume information: C:\Users\user\Desktop\lZmUPfUitK.exe VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeQueries volume information: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exeQueries volume information: C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\lZmUPfUitK.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts1
                    PowerShell
                    1
                    Registry Run Keys / Startup Folder
                    311
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping1
                    Security Software Discovery
                    Remote Services1
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    Registry Run Keys / Startup Folder
                    1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
                    Virtualization/Sandbox Evasion
                    Security Account Manager21
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    File and Directory Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common2
                    Obfuscated Files or Information
                    Cached Domain Credentials12
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items2
                    Software Packing
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    lZmUPfUitK.exe28%VirustotalBrowse
                    lZmUPfUitK.exe31%ReversingLabsByteCode-MSIL.Downloader.Seraph
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe31%ReversingLabsByteCode-MSIL.Downloader.Seraph
                    SourceDetectionScannerLabelLinkDownload
                    15.0.InstallUtil.exe.140000000.4.unpack100%AviraHEUR/AGEN.1216633Download File
                    15.0.InstallUtil.exe.140000000.1.unpack100%AviraHEUR/AGEN.1216633Download File
                    15.0.InstallUtil.exe.140000000.2.unpack100%AviraHEUR/AGEN.1216633Download File
                    15.0.InstallUtil.exe.140000000.0.unpack100%AviraHEUR/AGEN.1216633Download File
                    15.0.InstallUtil.exe.140000000.3.unpack100%AviraHEUR/AGEN.1216633Download File
                    15.2.InstallUtil.exe.140000000.0.unpack100%AviraHEUR/AGEN.1216633Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                    https://contoso.com/0%URL Reputationsafe
                    https://contoso.com/License0%URL Reputationsafe
                    https://contoso.com/Icon0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    a-0019.standard.a-msedge.net
                    204.79.197.222
                    truefalse
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://nuget.org/NuGet.exepowershell.exe, 00000007.00000002.515256394.0000015D2A0D1000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://github.com/mgravell/protobuf-netiDwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmpfalse
                          high
                          https://stackoverflow.com/q/14436606/23354Dwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmp, Dwdsyugg.exe, 00000017.00000002.630424780.000001C780032000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://github.com/mgravell/protobuf-netJDwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmpfalse
                              high
                              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000007.00000002.501289931.0000015D1A27E000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000007.00000002.501289931.0000015D1A27E000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000007.00000002.501289931.0000015D1A27E000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://stackoverflow.com/q/11564914/23354;Dwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmpfalse
                                    high
                                    https://stackoverflow.com/q/2152978/23354Dwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000007.00000002.501289931.0000015D1A27E000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/powershell.exe, 00000007.00000002.515256394.0000015D2A0D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://nuget.org/nuget.exepowershell.exe, 00000007.00000002.515256394.0000015D2A0D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://contoso.com/Licensepowershell.exe, 00000007.00000002.515256394.0000015D2A0D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://contoso.com/Iconpowershell.exe, 00000007.00000002.515256394.0000015D2A0D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://github.com/mgravell/protobuf-netDwdsyugg.exe, 00000017.00000002.637506740.000001C7FA910000.00000004.00000001.00040000.00000000.sdmpfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000007.00000002.500098040.0000015D1A071000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://github.com/Pester/Pesterpowershell.exe, 00000007.00000002.501289931.0000015D1A27E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                No contacted IP infos
                                                Joe Sandbox Version:35.0.0 Citrine
                                                Analysis ID:652388
                                                Start date and time: 26/06/202209:34:432022-06-26 09:34:43 +02:00
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 7m 50s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Sample file name:lZmUPfUitK.exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:24
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal88.troj.evad.winEXE@8/8@0/0
                                                EGA Information:Failed
                                                HDC Information:
                                                • Successful, ratio: 0.2% (good quality ratio 0.2%)
                                                • Quality average: 100%
                                                • Quality standard deviation: 0%
                                                HCA Information:Failed
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Adjust boot time
                                                • Enable AMSI
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                                • Excluded domains from analysis (whitelisted): www.bing.com, fp.msedge.net, client.wns.windows.com, fs.microsoft.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, 1.perf.msedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                                                • Execution Graph export aborted for target Dwdsyugg.exe, PID 6344 because it is empty
                                                • Execution Graph export aborted for target InstallUtil.exe, PID 3564 because it is empty
                                                • Execution Graph export aborted for target powershell.exe, PID 5780 because it is empty
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                TimeTypeDescription
                                                09:36:40API Interceptor43x Sleep call for process: powershell.exe modified
                                                09:37:21AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Dwdsyugg "C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe"
                                                09:37:29AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Dwdsyugg "C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe"
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                a-0019.standard.a-msedge.netMV. AVENIR TBN VESSEL DETAILS.docx.exeGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                SecuriteInfo.com.W32.AIDetectNet.01.25492.exeGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                Signed_PO_003485940.exeGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                4Os5JWDs7J.dllGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                texdpEFl8r.exeGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                YI52XpVV6Y.exeGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                Qasim_Haxor.exeGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                #U70b9#U51fb#U5b89#U88c5-#U7eb8#U98de#U673a#U7b80#U4f53#U4e2d#U6587#U8bed#U8a00#U5305.comGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                Ou5tput.exe.exeGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                Fichero_Comprobante125822355MX12152022.htmGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                17.06.2022 cuma.docxGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                jUPHTA73IC.exeGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                w7QV15PTIU.exeGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                SecuriteInfo.com.W32.AIDetectNet.01.2759.exeGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                jsgSQzzt8S.dllGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                TLEsLC17Fy.dllGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                hJKjT75NRB.dllGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                purchase order.exeGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                customs broker_outstandings.jsGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                SecuriteInfo.com.Gen.Variant.Nemesis.8198.16406.exeGet hashmaliciousBrowse
                                                • 204.79.197.222
                                                No context
                                                No context
                                                No context
                                                Process:C:\Users\user\Desktop\lZmUPfUitK.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):1055
                                                Entropy (8bit):5.373947760078582
                                                Encrypted:false
                                                SSDEEP:24:ML9E4KrgKDE4KGKN08AKha1qE4GiD0E4KeGmAE4KKPz:MxHKEYHKGD8Aoa1qHGiD0HKeGmAHKKPz
                                                MD5:081493100AB0E95ACE690AEC029382E7
                                                SHA1:B578108AFDB2943ABEAF1B0418917D9F8DD5F51B
                                                SHA-256:34588524B1387DDF305107650BA13B0AE0C442244DD0982283C82083351655FC
                                                SHA-512:22C59892B63C8847330B8B332465F7D0240B3B8921F9659470368793164BAEE9FA3CC0167F297C290E0629580C76F26707D8956B6A0781712C0B2DB9E1F1D112
                                                Malicious:true
                                                Reputation:low
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\49e5c0579db170be9741dccc34c1998e\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\6d7d43e19d7fc0006285b85b7e2c8702\System.Windows.Forms.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):18817
                                                Entropy (8bit):5.001217266823362
                                                Encrypted:false
                                                SSDEEP:384:sEvOjJiYoWVoGIpN6KQkj2dNXp5FOdBo+ib4+jjkjh4iUxL2c+4Jib4J:s0MiYoWV3IpNBQkj2dNZvOdBopj2h4iu
                                                MD5:A30A545B73C738B58F7D7089B1C9FF63
                                                SHA1:2F4784CFB523E34E6492F67EF7A04C7A20F16872
                                                SHA-256:2F1991061F8982C2AAB4D49CAF78BE84E1282EFED26BE6775989B0EC4C9464BC
                                                SHA-512:3C2DE1D82999C46EC2BA11DBA721E011950DC510F67E3226D61DF7CA9579F1F95F0BE7BE31A2BD61E92DDD1930563061131614C59D81472A92DBF529A1143316
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:PSMODULECACHE.....yH.8...I...C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........AfterEach........Should........BeforeEach........Get-MockDynamicParameters........It........Assert-VerifiableMocks........BeforeAll........Context........Set-TestInconclusive........AfterAll........Setup........Set-DynamicParameterVariables........Invoke-Pester........Assert-MockCalled........New-PesterOption........l:]2...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\ConfigCI\ConfigCI.psd1........Get-CIPolicyInfo........Get-CIPolicyIdInfo........Set-CIPolicySetting........Merge-CIPolicy........Edit-CIPolicyRule........Set-CIPolicyVersion........Set-CIPolicyIdInfo........ConvertFrom-CIPolicy........Set-HVCIOptions........Add-SignerRule........New-CIPolicy........Get-SystemDriver........Set-RuleOption........Get-CIPolicy......
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):64
                                                Entropy (8bit):0.9260988789684415
                                                Encrypted:false
                                                SSDEEP:3:Nlllulb/lj:NllUb/l
                                                MD5:13AF6BE1CB30E2FB779EA728EE0A6D67
                                                SHA1:F33581AC2C60B1F02C978D14DC220DCE57CC9562
                                                SHA-256:168561FB18F8EBA8043FA9FC4B8A95B628F2CF5584E5A3B96C9EBAF6DD740E3F
                                                SHA-512:1159E1087BC7F7CBB233540B61F1BDECB161FF6C65AD1EFC9911E87B8E4B2E5F8C2AF56D67B33BC1F6836106D3FEA8C750CC24B9F451ACF85661E0715B829413
                                                Malicious:false
                                                Preview:@...e................................................@..........
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:very short file (no magic)
                                                Category:dropped
                                                Size (bytes):1
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3:U:U
                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                Malicious:false
                                                Preview:1
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:very short file (no magic)
                                                Category:dropped
                                                Size (bytes):1
                                                Entropy (8bit):0.0
                                                Encrypted:false
                                                SSDEEP:3:U:U
                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                Malicious:false
                                                Preview:1
                                                Process:C:\Users\user\Desktop\lZmUPfUitK.exe
                                                File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):955392
                                                Entropy (8bit):7.992663009121081
                                                Encrypted:true
                                                SSDEEP:24576:6JvNxleI9Ee8wRnMvsjLaIosmj9slQnelgUWSQucph6:2Nltjqsmj9fc7QFr6
                                                MD5:808C44B1B4E11B8B5428C05DE17884C7
                                                SHA1:7AE0A547F38F21B6035E1726BD4700D963CEB8A2
                                                SHA-256:70199C37FF74D3FEEBD76F55EF786284132979A9B8F14BF1180D1F6B30EBB6A3
                                                SHA-512:EEB85C7B758E24C5A9AB9B44CC8A80B41A5B488504E4A302A653DD077F7518E7D992319A41DEBFD429B6FADD2F1345FC23E5F5F409C11578B79B5F43B6FBE008
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 31%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......b.........."...0..N...D........... .....@..... ....................................`..............................................................D........................................................................................... ..H............text....M... ...N.................. ..`.rsrc....D.......D...P..............@..@........................................H........Z..............x%..............................................".(.....*".(.....*...0..g.........s......s........s....s........+..+.o....+.....+..o....+.,.+....o........+..o....+.,.+....,..o.......*..(......./..........:I..........RZ.......0.."........ .4.......%.....(......(.....+..*...0..L........s........o......s........o......o......!.,..o.......,..o.......,..o.......*.(.......)..........$4..........8?.......0..`.........(....(....o....(...+o.....+"..(.......o....r...p(.
                                                Process:C:\Users\user\Desktop\lZmUPfUitK.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:false
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):5984
                                                Entropy (8bit):5.489501598492104
                                                Encrypted:false
                                                SSDEEP:96:BZtx6JN3aPqDo1Z/2Zi6JN3aPqDo1ZFvZprZf6JN3aPqDo1ZiwTTwZP:xyalWa2aK
                                                MD5:A72FEF34553F10A11B1F4759605D1621
                                                SHA1:3AB6EB0B5FCC3983F1E15F5FC306F9EE0431F47D
                                                SHA-256:DC02C2E457274C599359105AB40EAC5D02AF05100BF6B99B8FBB8C3BE5FF01CA
                                                SHA-512:132EA0FA4BA3DE2BC2BE90D1A0603AECBA71EBF9A39B79913E5AB9F23E97CE3291F91493631F0F298769A3E092A68E9F849E1E2EC2ED765C0896BFE598183A13
                                                Malicious:false
                                                Preview:.**********************..Windows PowerShell transcript start..Start time: 20220626093640..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 065367 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==..Process ID: 5780..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220626093640..**********************..PS>Start-Sleep -Seconds 10; Set-MpPreference -ExclusionPath 'C:\'..**********************..Windows PowerShell transcript start..Star
                                                File type:
                                                Entropy (8bit):7.992663009121081
                                                TrID:
                                                • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                                • Win64 Executable GUI (202006/5) 46.43%
                                                • Win64 Executable (generic) (12005/4) 2.76%
                                                • Generic Win/DOS Executable (2004/3) 0.46%
                                                • DOS Executable Generic (2002/1) 0.46%
                                                File name:lZmUPfUitK.exe
                                                File size:955392
                                                MD5:808c44b1b4e11b8b5428c05de17884c7
                                                SHA1:7ae0a547f38f21b6035e1726bd4700d963ceb8a2
                                                SHA256:70199c37ff74d3feebd76f55ef786284132979a9b8f14bf1180d1f6b30ebb6a3
                                                SHA512:eeb85c7b758e24c5a9ab9b44cc8a80b41a5b488504e4a302a653dd077f7518e7d992319a41debfd429b6fadd2f1345fc23e5f5f409c11578b79b5f43b6fbe008
                                                SSDEEP:24576:6JvNxleI9Ee8wRnMvsjLaIosmj9slQnelgUWSQucph6:2Nltjqsmj9fc7QFr6
                                                TLSH:C91533B2664BF89ECA14D071F664DEC913ECCE3320155B34FD55316E8663AC843ABBA4
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......b.........."...0..N...D........... .....@..... ....................................`................................
                                                Icon Hash:e4d8d8d8dc483196
                                                No network behavior found

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:09:35:57
                                                Start date:26/06/2022
                                                Path:C:\Users\user\Desktop\lZmUPfUitK.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\lZmUPfUitK.exe"
                                                Imagebase:0x18987f80000
                                                File size:955392 bytes
                                                MD5 hash:808C44B1B4E11B8B5428C05DE17884C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000003.528377603.000001899A14D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000003.527464350.0000018999FE4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low

                                                Target ID:7
                                                Start time:09:36:37
                                                Start date:26/06/2022
                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
                                                Imagebase:0x7ff612400000
                                                File size:447488 bytes
                                                MD5 hash:95000560239032BC68B4C2FDFCDEF913
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Reputation:high

                                                Target ID:9
                                                Start time:09:36:38
                                                Start date:26/06/2022
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7bab80000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                Target ID:15
                                                Start time:09:37:22
                                                Start date:26/06/2022
                                                Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                Imagebase:0x1ed0d130000
                                                File size:40552 bytes
                                                MD5 hash:6EE3F830099ADD53C26DF5739B44D608
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000F.00000002.632975548.000001ED0EEB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000F.00000002.634332225.000001ED27600000.00000004.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000F.00000002.633968857.000001ED1EFB0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000F.00000002.633387548.000001ED1EEA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:moderate

                                                Target ID:18
                                                Start time:09:37:29
                                                Start date:26/06/2022
                                                Path:C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe"
                                                Imagebase:0x28f20f60000
                                                File size:955392 bytes
                                                MD5 hash:808C44B1B4E11B8B5428C05DE17884C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Antivirus matches:
                                                • Detection: 31%, ReversingLabs
                                                Reputation:low

                                                Target ID:23
                                                Start time:09:37:39
                                                Start date:26/06/2022
                                                Path:C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\AppData\Roaming\Lwwaqb\Dwdsyugg.exe"
                                                Imagebase:0x1c7f8380000
                                                File size:955392 bytes
                                                MD5 hash:808C44B1B4E11B8B5428C05DE17884C7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000017.00000002.637024650.000001C7FA110000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000017.00000002.637024650.000001C7FA110000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000017.00000002.630424780.000001C780032000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low

                                                Reset < >
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519713003.00007FF859130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859130000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0A*Y$hA*Y$hA*Y
                                                  • API String ID: 0-698502218
                                                  • Opcode ID: d3046dc6dbfc97a6f9a95226839c9e960b8c9bf19822583a7ac66c5e44ae16aa
                                                  • Instruction ID: 3932252a59c37818f61e54075dc85b72587c0f9b85db36159eba792f32e4da9a
                                                  • Opcode Fuzzy Hash: d3046dc6dbfc97a6f9a95226839c9e960b8c9bf19822583a7ac66c5e44ae16aa
                                                  • Instruction Fuzzy Hash: 4FF1F02194E7DA4FE7969B3858251A87FB1EF576A0B0D01FBD08CCB1D3DA1C9C0A8352
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519340007.00007FF859060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859060000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859060000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: `2Y
                                                  • API String ID: 0-2622453623
                                                  • Opcode ID: 8eb1e9c05e1b9d6860ba0bd9b65e8a09591b4d3a62e64104abd29872c65ac374
                                                  • Instruction ID: f7d018c285ed464532b3ff93fd2a180bac732f9009ae5a316c4d3a15d44e64dd
                                                  • Opcode Fuzzy Hash: 8eb1e9c05e1b9d6860ba0bd9b65e8a09591b4d3a62e64104abd29872c65ac374
                                                  • Instruction Fuzzy Hash: 42F1C230A08A8D8FDF98DF1CC495AA97BF1FF68350F58056AD449D7296CB34E846CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519713003.00007FF859130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859130000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0A*Y
                                                  • API String ID: 0-3723224370
                                                  • Opcode ID: a25d025372398360d396763d3889a9da514888e6618e5477d29d31bb14eba9d9
                                                  • Instruction ID: c3f89771f84b66cc87efb6fbed3df0fb45d4de8a6bc7208de4491b5f9591ef88
                                                  • Opcode Fuzzy Hash: a25d025372398360d396763d3889a9da514888e6618e5477d29d31bb14eba9d9
                                                  • Instruction Fuzzy Hash: 4B511332E4CA9A4FEBAADA2C541127877E2EF95670B5C11BAC14EC75D3DF18EC058381
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519713003.00007FF859130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859130000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0A*Y
                                                  • API String ID: 0-3723224370
                                                  • Opcode ID: 60433aa49181c5fbf5f1484c6e9aa251bcc0d7a09d66b394cc546724dd16b343
                                                  • Instruction ID: 46ce07c69e92ca8145c5ae5406aee52c5bbfb1ae57a06a5b2c8069b3f823a8d3
                                                  • Opcode Fuzzy Hash: 60433aa49181c5fbf5f1484c6e9aa251bcc0d7a09d66b394cc546724dd16b343
                                                  • Instruction Fuzzy Hash: 6A21DD22E4DAAA4FEAE9DE2C945127866E1FF543A0B5C10BAD10EC75E2CF1CEC058641
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519713003.00007FF859130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859130000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: hA*Y
                                                  • API String ID: 0-3545416319
                                                  • Opcode ID: 0e68eb01a806aea1c54e1ad0d46b6bc108a9ade74172e90d2998e2fafb65679b
                                                  • Instruction ID: eec4050829fef25f29ff4e794931293055d28bb10ae8bb9b3617dc6516245224
                                                  • Opcode Fuzzy Hash: 0e68eb01a806aea1c54e1ad0d46b6bc108a9ade74172e90d2998e2fafb65679b
                                                  • Instruction Fuzzy Hash: E411A032D4D5E54FEAA4DB28945467C7BE1EF557B0B4C11FAC04EC71D2DA09EC448381
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519713003.00007FF859130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859130000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8F*Y
                                                  • API String ID: 0-487643992
                                                  • Opcode ID: 79446a48038ec5de6b2bbc66e28ee409ade05d10af9356dbdaaecb5e712ca5fc
                                                  • Instruction ID: 21e5c0f585a64e6f1c6d5d283f5ea5cef61cbd6785df96487eaaf932ba6bc6e6
                                                  • Opcode Fuzzy Hash: 79446a48038ec5de6b2bbc66e28ee409ade05d10af9356dbdaaecb5e712ca5fc
                                                  • Instruction Fuzzy Hash: 70012472E0DA894FEB86DBAC64905F877A1FF69360B1C00BEC14DD7197CA18D8058380
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519713003.00007FF859130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859130000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8F*Y
                                                  • API String ID: 0-487643992
                                                  • Opcode ID: f432c0327262b51896ba147c377f12f4b86134b6d91f9e28c5a792d177a9e675
                                                  • Instruction ID: ff74798a6fa7667806f27385c14bf4de2e47612c4607e4052e2c39703adcd05d
                                                  • Opcode Fuzzy Hash: f432c0327262b51896ba147c377f12f4b86134b6d91f9e28c5a792d177a9e675
                                                  • Instruction Fuzzy Hash: 18F02832A0D6984FFB57E76C14551F8BBA0EF2A390F0800FEC25DD7283D91854458391
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519713003.00007FF859130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859130000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b4950b7200868e4f55b53e331ed47cde887282bb17c5c69bfb30b73a6f211ee0
                                                  • Instruction ID: f9031454d55826a2df599dca902da70d2bac6663425de9a4ffb8f75956733b0d
                                                  • Opcode Fuzzy Hash: b4950b7200868e4f55b53e331ed47cde887282bb17c5c69bfb30b73a6f211ee0
                                                  • Instruction Fuzzy Hash: EAD1027194E7D95FDB569B2898156A67FB1FF92360B0901FBD08CCB093DB1CA806C392
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519340007.00007FF859060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859060000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859060000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 23a839029a9d5e78fa923d800d9063395ab73cf99d95ebf1bb9af4e22e8c8d06
                                                  • Instruction ID: aca691a2d5a505d25f707a75fb5f76684d30e0444fcd169eaefcabf9fd85d4b3
                                                  • Opcode Fuzzy Hash: 23a839029a9d5e78fa923d800d9063395ab73cf99d95ebf1bb9af4e22e8c8d06
                                                  • Instruction Fuzzy Hash: 3831F83191CB488FDB18DF5CD80A6A97BE0FBA9721F04426FE449C3152DB74A855CBC2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519340007.00007FF859060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859060000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859060000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6abb56ad7261377bd99a139694237ae5f031a608622620d3701bb608e5795698
                                                  • Instruction ID: 41f7749f04e408a1c6850f47bf42192f4700797bb79d9c676dbcacc8fb13a2c8
                                                  • Opcode Fuzzy Hash: 6abb56ad7261377bd99a139694237ae5f031a608622620d3701bb608e5795698
                                                  • Instruction Fuzzy Hash: DC21063190C6888FDB59DF6C98097E97FE0EB96331F0442AFD448C7196C775941ACB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519340007.00007FF859060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859060000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859060000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 90e9133af467207049a1677d957258f0141214281d6496964df0492a40d6b616
                                                  • Instruction ID: a95496aa75797927eb40d0860beb448b4b56000d95f327725c3cbceb7c159053
                                                  • Opcode Fuzzy Hash: 90e9133af467207049a1677d957258f0141214281d6496964df0492a40d6b616
                                                  • Instruction Fuzzy Hash: 7801443131CA094FDB8CEA1CE4A2AB573E1EB95364B50006ED44AC7697DE27E843C745
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519713003.00007FF859130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859130000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8a75f9503fa12bbfa0a10c58cc0f70ac86648486c53c326e6ef2e147d57742d4
                                                  • Instruction ID: cc7d311113fdd9e974aef528c2f8a97ae9fe52a55d70bc1517844d584c43593d
                                                  • Opcode Fuzzy Hash: 8a75f9503fa12bbfa0a10c58cc0f70ac86648486c53c326e6ef2e147d57742d4
                                                  • Instruction Fuzzy Hash: 6E018432B0C9188FDF95EB5CA4429EDB3E2EB59760B1801B7D10DC7193DE29D8068784
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519340007.00007FF859060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859060000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859060000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6025efde5916bb5055f2ae0a6fd948e162988d69f2fd09b4ecb0257ef2c4fdd8
                                                  • Instruction ID: c9b71a76ccbb110afe37f3c8bd1d3f3f05fb3d24639919f92397c23e2d7879aa
                                                  • Opcode Fuzzy Hash: 6025efde5916bb5055f2ae0a6fd948e162988d69f2fd09b4ecb0257ef2c4fdd8
                                                  • Instruction Fuzzy Hash: D401677115CB0C4FDB44EF0CE451AA6B7E0FB95364F50056DE58AC3651DB36E882CB45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519340007.00007FF859060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859060000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859060000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2017e536b2fe9c435413a4a8cd6bbc6163279f277f592fea6139e46991f2d627
                                                  • Instruction ID: 4b64aea7b693ac7c2c4bd315207fe88dd732e85ac1eec5a00717b652b9935ca5
                                                  • Opcode Fuzzy Hash: 2017e536b2fe9c435413a4a8cd6bbc6163279f277f592fea6139e46991f2d627
                                                  • Instruction Fuzzy Hash: 9CF0F63480C6C94FDB06DF2898194D97FA0EF16260B0902DBE448C70A2DB75D858C7C2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519340007.00007FF859060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859060000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859060000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 710cdf5f016bee13e05167997a9e71f4dde8ca468305b88cfd7229e919595c35
                                                  • Instruction ID: 7f9a29c701cb069a660b7d8d0e8ce0f21a682acd8ed74db84facfff364df567b
                                                  • Opcode Fuzzy Hash: 710cdf5f016bee13e05167997a9e71f4dde8ca468305b88cfd7229e919595c35
                                                  • Instruction Fuzzy Hash: 86F0373275C6044FDB4CAA1CF4429B573D1E795324B40056EE98BC2696D917F8468685
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519340007.00007FF859060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859060000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859060000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: `_^$`_^$`_^$`_^$`_^$`_^$`_^
                                                  • API String ID: 0-3069730305
                                                  • Opcode ID: eb09295f3e5ecfd6c91a3139ff40dd8dc21ca9e26ec847eb23cf5bb28791ab10
                                                  • Instruction ID: 16f090080fc655c6ac31bbdad6e4e5a158765b459a0f68e14ff425f1a13d7685
                                                  • Opcode Fuzzy Hash: eb09295f3e5ecfd6c91a3139ff40dd8dc21ca9e26ec847eb23cf5bb28791ab10
                                                  • Instruction Fuzzy Hash: D85197A3D0CAD68FE755CF2998990957B70FF2136879D04FEC4D847047EB2AB80A8751
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519713003.00007FF859130000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859130000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859130000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ;Y
                                                  • API String ID: 0-1135456943
                                                  • Opcode ID: 106d31c101a30a6bd53a347486709a2bfa804f2d2454c09f7f825defdf539e82
                                                  • Instruction ID: cf511e79c440a867023d4eb42192131597ed5064e4810cfb0ed72675ee28c5d3
                                                  • Opcode Fuzzy Hash: 106d31c101a30a6bd53a347486709a2bfa804f2d2454c09f7f825defdf539e82
                                                  • Instruction Fuzzy Hash: 35B14131A4DACA4FEB969B3C98156B57BB0EF46260B4901FBD04DCB193DA1CA80AC355
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519340007.00007FF859060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859060000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859060000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 43a465f8c6ab51ad6fd403232c65d11f29b6cfd4634e5aeb8e0425cc07acc673
                                                  • Instruction ID: cc502c55225f741770a800bf208f33e802d29c9bde4cdc83c99c836044d95a2a
                                                  • Opcode Fuzzy Hash: 43a465f8c6ab51ad6fd403232c65d11f29b6cfd4634e5aeb8e0425cc07acc673
                                                  • Instruction Fuzzy Hash: 0F91B767D0D2D24FEB56DA3CA8A60E57F60DF426B4B5D05FBC1C48A093EF09984EC291
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.519340007.00007FF859060000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859060000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_7ff859060000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bcc4b254f09ff57f132f1a0b8b7f4a1dd57fa0420b35094b260136b09fa4e437
                                                  • Instruction ID: f71d1e6a679bc163a1d11c0fea0fee7682e1411ec9105b04525e1fbb8da85f52
                                                  • Opcode Fuzzy Hash: bcc4b254f09ff57f132f1a0b8b7f4a1dd57fa0420b35094b260136b09fa4e437
                                                  • Instruction Fuzzy Hash: 5551A15AD0E6C25FE2179A38A86A0957F70EF536B4B5D00FBC0844B0E3AB49980FC791
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: )__H$<'_
                                                  • API String ID: 0-617993514
                                                  • Opcode ID: af575d83d39ee2526c587ca8cc338d1fc8ab294a5cf3c69b38308f4e3142a1a6
                                                  • Instruction ID: d95eb355cf6f44534e77e3383f3a9c739fb0cd0c43e08295ef9d16facaa4fdec
                                                  • Opcode Fuzzy Hash: af575d83d39ee2526c587ca8cc338d1fc8ab294a5cf3c69b38308f4e3142a1a6
                                                  • Instruction Fuzzy Hash: A4E1D370A4DB898FDB82DB6888557987FE1FF96320F4801FEC089CB5A2DB6C5846C751
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 361e0694d19cab8bb48e51ffae6db64d2ab2ae56c8203d548a1802de1d73ef3f
                                                  • Instruction ID: 50562769252fe72efe004e41b89db6f4192454cda739613a0de77aec277eb850
                                                  • Opcode Fuzzy Hash: 361e0694d19cab8bb48e51ffae6db64d2ab2ae56c8203d548a1802de1d73ef3f
                                                  • Instruction Fuzzy Hash: 83519271A0E6C58FDB86DB7888555A97BF0EF56360B0905FEC049CB5A3DB2C984AC701
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 78cf94e2f89cac01543b00b1c8988593ccbec74463f039862c1d088f805d9571
                                                  • Instruction ID: 8730c0fd9b8c627ffe052da449b349ebd03ef02208b0874896fe62e4096c40cb
                                                  • Opcode Fuzzy Hash: 78cf94e2f89cac01543b00b1c8988593ccbec74463f039862c1d088f805d9571
                                                  • Instruction Fuzzy Hash: DE313921B4DA965FEB45B67C280A0F97BD0DF86370B0504FED50ACB5A3CE1C9C868284
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: da516ad38dbe87363c5560ee72f91f63f5ba7e1d465f71e95a723c465fc0d1ee
                                                  • Instruction ID: 117223c541b71965252394193ddbce848142a2aa9977567357a656633cb31052
                                                  • Opcode Fuzzy Hash: da516ad38dbe87363c5560ee72f91f63f5ba7e1d465f71e95a723c465fc0d1ee
                                                  • Instruction Fuzzy Hash: FC31FA36F0D6968BDF45EE2CD8951E87BE0EF82271F1904B7C145CB192DB28984E8780
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 889f56e221830a81d88ecb32b83bc905473bf9caafa8dd54bcf5989a2dca2b61
                                                  • Instruction ID: fa0ef805beb5907feb5834a94795fd971b701048f75ce20c390287e89d6b0c1f
                                                  • Opcode Fuzzy Hash: 889f56e221830a81d88ecb32b83bc905473bf9caafa8dd54bcf5989a2dca2b61
                                                  • Instruction Fuzzy Hash: 74314B30B4EA865FEB89EA3C045A5B97AE1DF9927074905FED04EC76A3CE1C9C46C341
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c0500d221ead3231f03905f95bccf30352c3bcec44148ad13c8d2b508a933c9d
                                                  • Instruction ID: f0f81d95adc9ae7debca7381ef944f334c84ed03f1915285f70e9f1f67f767ef
                                                  • Opcode Fuzzy Hash: c0500d221ead3231f03905f95bccf30352c3bcec44148ad13c8d2b508a933c9d
                                                  • Instruction Fuzzy Hash: 5321D371909BCA9FDB81DF78844959A7BE0FF95220B4409FED088CB172D7388846C701
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3f33df413d004a3060040bea6934e5a9f2462ad74487595a577b12120a6910ba
                                                  • Instruction ID: 99bfa156050b73794298fe801ccb8aa698c70de922d15db6dafee0948edd0acb
                                                  • Opcode Fuzzy Hash: 3f33df413d004a3060040bea6934e5a9f2462ad74487595a577b12120a6910ba
                                                  • Instruction Fuzzy Hash: 09215171B0E6CA8FD752DB3C98650597BE0EF9666034A41FBC089CB5A2DA1C8C4AC351
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f4cf2fab90a1e22ba44d01e86c94f1cfd2e4986921661a039b30c025ade2f6ce
                                                  • Instruction ID: 819a4c2384d0a5ce0873351812989c133e5ab20b07e48a3f586252db3bb0e07d
                                                  • Opcode Fuzzy Hash: f4cf2fab90a1e22ba44d01e86c94f1cfd2e4986921661a039b30c025ade2f6ce
                                                  • Instruction Fuzzy Hash: D9011721F19C5D5FAED4EB5CA4526FDB3E2FF88790B950675E10EE3282CF28A8414790
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3126cc8d12cbde73b18f820c8cd863a3f305b9f0c9ce0dd10327abd0672e108e
                                                  • Instruction ID: 9af2bd5c0144493d38113378f16171cebc8983694af00d72ebc83f279b0f751a
                                                  • Opcode Fuzzy Hash: 3126cc8d12cbde73b18f820c8cd863a3f305b9f0c9ce0dd10327abd0672e108e
                                                  • Instruction Fuzzy Hash: AE11603AB092859BDF01EF28D8955ED7BB0EF82365F1944B7C1448A252DB34A98D8780
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3031512014ba3fb7f0d49804c38282105c760eae80bff5d28140a18632eb6176
                                                  • Instruction ID: ce7b5ab2891c47b25ba056be47c546f3ff407aa1b2d7412c6dd75544282cbbd9
                                                  • Opcode Fuzzy Hash: 3031512014ba3fb7f0d49804c38282105c760eae80bff5d28140a18632eb6176
                                                  • Instruction Fuzzy Hash: 7CF04930E0C6869FEB85DF6488505BD7BF1AF463A0F590ABAC04ACB696DA2C9548C741
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1b090ffb0736c1ec058a74382d7c95855045577be378850cf0f49c2f29d43030
                                                  • Instruction ID: 5d6bc4e4ed6942d435e60ddf2909c3a37ab8a8819b601a7b6a15cf5b854e4c9a
                                                  • Opcode Fuzzy Hash: 1b090ffb0736c1ec058a74382d7c95855045577be378850cf0f49c2f29d43030
                                                  • Instruction Fuzzy Hash: 69F0EC60A0DEC52FDB45B6B5082E89E7FE0DF5526074905EDC445C70A3DA5C4C4A8701
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c5cab14743e592059712c32fa45b36e55c81d4b26628c98bb87a9ed44ba916c1
                                                  • Instruction ID: 5a1d9f2dc532583c79c50ed4e8014402b58f02432c4f4d2a5a7db76dbb04e606
                                                  • Opcode Fuzzy Hash: c5cab14743e592059712c32fa45b36e55c81d4b26628c98bb87a9ed44ba916c1
                                                  • Instruction Fuzzy Hash: 33E08071F2CA8D4FEA95F77C10292FD55D1EF88290B2504B9D40EC32E3EF18980A5341
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5761ba28d6f49e5284a11f58e192ac6bb73519f08e8fba54514ef0eca29f607d
                                                  • Instruction ID: e853820f7abfb0f252083b8dc077e642237fb782626a5f1a1c08d42090963e6c
                                                  • Opcode Fuzzy Hash: 5761ba28d6f49e5284a11f58e192ac6bb73519f08e8fba54514ef0eca29f607d
                                                  • Instruction Fuzzy Hash: BBB09208E6A48A02EC643AB908431EEA8A00F842A0FDA0830E408401839F4DA09C0A63
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000F.00000002.634890315.00007FF859080000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859080000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_15_2_7ff859080000_InstallUtil.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: acbd12d51a3c30da78bf2aee2e772519ed33b538b251a20f4509a5b0eb99ec34
                                                  • Instruction ID: aabbe6e7964eb61e9c66b139724520c338b0670d4fc6782e384b2a7994eac7d2
                                                  • Opcode Fuzzy Hash: acbd12d51a3c30da78bf2aee2e772519ed33b538b251a20f4509a5b0eb99ec34
                                                  • Instruction Fuzzy Hash: 5DB01231E0819983FB049E20C4402FF25A10F44370F0F4C31C40E260C1DF2CF48996C0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: g;_
                                                  • API String ID: 0-2711715726
                                                  • Opcode ID: 1667cd897cff9b5ac5e8b8fdc2277646c827760414bc50f30e8c21ef16fce485
                                                  • Instruction ID: 190d156a22a22eb9e7b8bc47d0f21c6319999177fb53098a74856315c9bd2883
                                                  • Opcode Fuzzy Hash: 1667cd897cff9b5ac5e8b8fdc2277646c827760414bc50f30e8c21ef16fce485
                                                  • Instruction Fuzzy Hash: 74D1F6B1909A898FEB51DF2CE8557A97BF0FF66364F1401BAD14DCB2A2CB396406C740
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4039211f3d899ec0ac7ec8e240f30f1deacc2b9e43b9c177af1363b6398234a9
                                                  • Instruction ID: 5c8f6a74095887580bde9fd5efaec3916382da9e6cb63bd2cccc2309d73599d5
                                                  • Opcode Fuzzy Hash: 4039211f3d899ec0ac7ec8e240f30f1deacc2b9e43b9c177af1363b6398234a9
                                                  • Instruction Fuzzy Hash: EBE1A330B28B8A4BD71C9E185C861B477D1EB96735B584A7EC487C3692EE24F45783C1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: gfff
                                                  • API String ID: 0-1553575800
                                                  • Opcode ID: 68c90af175f73eb320243bccdbc35d47489df4599ac31a19b44b4641082cc6fd
                                                  • Instruction ID: dda688e42132a2372fa1bd73ab241c8aa5f329d4f5c6023e71443c5485e6888e
                                                  • Opcode Fuzzy Hash: 68c90af175f73eb320243bccdbc35d47489df4599ac31a19b44b4641082cc6fd
                                                  • Instruction Fuzzy Hash: 26A14971E188E64BEB59AF6C64262BC2A96EF956F4F480979C04EC72D3CE18A8064341
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: >`_^
                                                  • API String ID: 0-3365381830
                                                  • Opcode ID: cf72277a3f01810d309b098d6efbefeb4ca08180bc29f028441c216c54fb6a32
                                                  • Instruction ID: 78a383d51296be1365668908a711b4fb07a1a7c2c115a3f0d5e89ae5a57d0729
                                                  • Opcode Fuzzy Hash: cf72277a3f01810d309b098d6efbefeb4ca08180bc29f028441c216c54fb6a32
                                                  • Instruction Fuzzy Hash: E3712B67A0D1954BDB12AF2CBC5B0EA7FA0EF52375B1801B7D18886053EF14A98E86D4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: >`_^
                                                  • API String ID: 0-3365381830
                                                  • Opcode ID: 1c6a92e06875bb6aa54c800dfec601e93a4a5a0871244813a02f3a6ad122d872
                                                  • Instruction ID: 9c5de9da28c17cef9b3723fc0f853de724eba789d1117111e24fbc195a95e630
                                                  • Opcode Fuzzy Hash: 1c6a92e06875bb6aa54c800dfec601e93a4a5a0871244813a02f3a6ad122d872
                                                  • Instruction Fuzzy Hash: D851F96B90D1958BDB12AB2CFC9B0EA7FB4EF52370B1C01B7D28489053EF14698E85D4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 44fbd51f325785fbd6d009772690e46b380e4d05e138d9564ea043be29a5f84c
                                                  • Instruction ID: b9f5c6b304a2c7ef5299586806edfb70c80693a6a07c00fdcb9d3502c5dcb70f
                                                  • Opcode Fuzzy Hash: 44fbd51f325785fbd6d009772690e46b380e4d05e138d9564ea043be29a5f84c
                                                  • Instruction Fuzzy Hash: C5910861D0C9CA4FDB89FF2864252B97BD1FF557B0F0805B9D45DC7293CE29A8068781
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1e2101329bb5b8712f9bd535adacd89a0c0d178980d2195f0724fb4e0e1ff17e
                                                  • Instruction ID: 6644461e7cd3fd39b9b6c622a1267f14142e4544888a696dfb261692df88b89a
                                                  • Opcode Fuzzy Hash: 1e2101329bb5b8712f9bd535adacd89a0c0d178980d2195f0724fb4e0e1ff17e
                                                  • Instruction Fuzzy Hash: BC915971D09A5D8FEF94DF6884597ADB7B1FB643A0F1401BAC00DE7291DB34A889CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e38a4d3fc0a312d83027ccf50a986c045e846a3b0b3c2d558e2669eb641aba9e
                                                  • Instruction ID: 6a0878369328da2c59c7260ef204d817685cf81be7ea393378f12d88fa0c983d
                                                  • Opcode Fuzzy Hash: e38a4d3fc0a312d83027ccf50a986c045e846a3b0b3c2d558e2669eb641aba9e
                                                  • Instruction Fuzzy Hash: A7814B71E1998D9FEF94EF689854AFEB7F1FB69360F040639D00DE7281DB24A8498740
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: de0dfa0333808851d68dd256889607ae0c45d3fd859afc9d418de5dc9bd00b12
                                                  • Instruction ID: 8744190df4317e269da70afb1b08d52713beedde04dac8a9c91fb20b8f017566
                                                  • Opcode Fuzzy Hash: de0dfa0333808851d68dd256889607ae0c45d3fd859afc9d418de5dc9bd00b12
                                                  • Instruction Fuzzy Hash: E5510470D1898D9FEF94EF98D854ABDB7F1FB69360F440579D00DE7282DB28A8498B40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0bce3968b58fe98991a713228635d5c6fe2845f0ab01ca8bdba20f8da8c783d1
                                                  • Instruction ID: 8bbef00a8306a84b64756de0ebd68cad1f0da3e391c227c51961c5bc5de7110a
                                                  • Opcode Fuzzy Hash: 0bce3968b58fe98991a713228635d5c6fe2845f0ab01ca8bdba20f8da8c783d1
                                                  • Instruction Fuzzy Hash: 36513971A0DACB9FDB55EF2864213E57BE1FF163A4F0909BDC04D87293CA259405C782
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b04099fd0a80405643863af5101c62dde1a2a910efca7b35114797beafc6c9c8
                                                  • Instruction ID: 1fe7c229540343466929133408c488b7add2af88400431f05ddc0c50f0dedaa6
                                                  • Opcode Fuzzy Hash: b04099fd0a80405643863af5101c62dde1a2a910efca7b35114797beafc6c9c8
                                                  • Instruction Fuzzy Hash: 2341F476E096C84FDB959F78A4161ED7FF0EF96274F0905FBC049CB1A2DA28590A8381
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 09b9c3d5400b5e5034f839d69edc611c59a87525f8d17759232a1aea058824b0
                                                  • Instruction ID: c944e2d4b299793875f92bd7a63ed5b7cd5191168997e5957baeff51dbda8a83
                                                  • Opcode Fuzzy Hash: 09b9c3d5400b5e5034f839d69edc611c59a87525f8d17759232a1aea058824b0
                                                  • Instruction Fuzzy Hash: 9B418431C0D6898FEB91DF648815AAD7BF0EF66360F0806BAD04DDB192DB28A44DCB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2ecd1e17f7833192a5661fd31cec1817595dff1e8261d87a694f384a99198843
                                                  • Instruction ID: 518661b71d6b40a22e3139181b96ab2796c817a2d11117bcddf16b968657ef83
                                                  • Opcode Fuzzy Hash: 2ecd1e17f7833192a5661fd31cec1817595dff1e8261d87a694f384a99198843
                                                  • Instruction Fuzzy Hash: 4E313860E0D5E90FE75D9B3C14650B97FE1EF45251F0805FFE09ACB1A3DA28D80A8780
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 700bf186020dd740dfa695d20e32f6428f19e14e132109109330c8d51d2a036a
                                                  • Instruction ID: c518e0f2100bfb50b5499502ffcbf0e7e733826f6ca5c8c9ac3c1c37b85a3e3c
                                                  • Opcode Fuzzy Hash: 700bf186020dd740dfa695d20e32f6428f19e14e132109109330c8d51d2a036a
                                                  • Instruction Fuzzy Hash: 11213772A096C94FDB96DF7CB4121AD7BE1EF922B4F0805FBC059CB162DB28490AC341
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 773e9aeb7a74a68e218ea0d5a7a39b56a5790ec627df55589bf44f5081ac996b
                                                  • Instruction ID: f2083f61148a83b27bee7bc79d8ebd54bad7a65393cc19b48e599630a86a08cc
                                                  • Opcode Fuzzy Hash: 773e9aeb7a74a68e218ea0d5a7a39b56a5790ec627df55589bf44f5081ac996b
                                                  • Instruction Fuzzy Hash: B2315A71E1D9C74BE769AF38202623A97E1FF116A4F084ABEC84DD77D2CF1498064380
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ee27d610e69a47ceea54668075cfc55cf779da70f53c5305f088151d86e96c24
                                                  • Instruction ID: 7ed1444c96cfac92196829237d0623fa22277ae0424fdc92b67e2f6637d182dc
                                                  • Opcode Fuzzy Hash: ee27d610e69a47ceea54668075cfc55cf779da70f53c5305f088151d86e96c24
                                                  • Instruction Fuzzy Hash: A331B531A0C6488FDB68DF1CE4156AA7BF1FF89311F1501BAD04DC76A2DB31A842CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 479a4a71815790a6055430770f38cb812dd7ee5656e2385ef64ac4570e5738f5
                                                  • Instruction ID: 8e01f2fde2e30f4ef001a04d3dc66accbb995ba05d8e93539a32d542cb21a577
                                                  • Opcode Fuzzy Hash: 479a4a71815790a6055430770f38cb812dd7ee5656e2385ef64ac4570e5738f5
                                                  • Instruction Fuzzy Hash: 4621AB31A1D6488FDB68DF18D8066EEB7E1FF44361F0505BED44ED3A52DF25684A8640
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 53767beac93f0b17d61db18638c8c191e039cf8246b0c93f22614468a8ee6254
                                                  • Instruction ID: 2e434580888c3c58db5b4bea1fa815905bdb7be0295bc6300c1847cc2fe0cc5b
                                                  • Opcode Fuzzy Hash: 53767beac93f0b17d61db18638c8c191e039cf8246b0c93f22614468a8ee6254
                                                  • Instruction Fuzzy Hash: C72167E29085825FE35DAB28682B5767BE1EF576B4F1805BCD58E87393DD06A802C281
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 18e1810a33a29e5838441d9af0444244f7a7f8a6af9ae9381ce79452417aebb7
                                                  • Instruction ID: 60b0d832ca08780093f5afd4283098a88423932cf70402e92644ecdb132923ee
                                                  • Opcode Fuzzy Hash: 18e1810a33a29e5838441d9af0444244f7a7f8a6af9ae9381ce79452417aebb7
                                                  • Instruction Fuzzy Hash: A621A431D4D68D8FEB81DB688854AEEBBF1FF59360F080276D049E3192DB2855498751
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6b1dfb57eb3349c2a4bfefbf2de6da182ffd855835aa042891b5d2ebd37e7102
                                                  • Instruction ID: c3b05c8ab0c973fadf0c63b438afc6cbfa6edf62b0c5e476a41fb5df264db522
                                                  • Opcode Fuzzy Hash: 6b1dfb57eb3349c2a4bfefbf2de6da182ffd855835aa042891b5d2ebd37e7102
                                                  • Instruction Fuzzy Hash: B011B431A0C64CCFDB68DE18D8466BA77F0FF84361F05057EE05EC3A91DF25A8468A80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 38cf5d56cce18f918f5644c19bc1cc19b59a33c36661bf4a30428d0855880a94
                                                  • Instruction ID: bf5acc1985cc2e72c23ee5fa4a3f4f324d10bcb0f2e98447c2ed16ac4a40621c
                                                  • Opcode Fuzzy Hash: 38cf5d56cce18f918f5644c19bc1cc19b59a33c36661bf4a30428d0855880a94
                                                  • Instruction Fuzzy Hash: 2D11BE716085188FDB58DB1CE4556A9B7E1FF98311F1042AED14ED3666DB31A8828B84
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 789ddcd12481568106a82edd3258e1edc2154f7aa4b982d14226a5ac38b79122
                                                  • Instruction ID: 4ed760515a74764f34e14772fc6b467577402c0dbe6079e741124860c9c1b73c
                                                  • Opcode Fuzzy Hash: 789ddcd12481568106a82edd3258e1edc2154f7aa4b982d14226a5ac38b79122
                                                  • Instruction Fuzzy Hash: 520124B0814F475FE3A4AF2CA05D2B67BE0FF19261B08093FC94DC7621DB24A8C18380
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ba1abec0b4d7a9c9b180e4a77e91b71a718de466df964d07ac62ca13cbcdb360
                                                  • Instruction ID: 4906cdaae06683e46104878c1a37a10c2ce4dd8be7cb7d085a34af5a920ffe6c
                                                  • Opcode Fuzzy Hash: ba1abec0b4d7a9c9b180e4a77e91b71a718de466df964d07ac62ca13cbcdb360
                                                  • Instruction Fuzzy Hash: D7F0E131A1C8860BD7546A3C341C1BABBD5DB5A1B470805BFD40CC3287CC0168054381
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8bcf38df15ba97b97200d07970d346a4ffea9d1cc9f6398746b49c7abfc30718
                                                  • Instruction ID: 6ea7e5c464f62d09fe67f6928e8b03f67164a2f9c27b99223e3fadf7e5856a18
                                                  • Opcode Fuzzy Hash: 8bcf38df15ba97b97200d07970d346a4ffea9d1cc9f6398746b49c7abfc30718
                                                  • Instruction Fuzzy Hash: 5FF08B7051EB850FE3049F3874262A4BBD1FF062A4F0805FEC448CB2B3CA2A44058781
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1594a7efe7cc0a45c26014e52a47b750353d709dbdca0224a918f3e6b78f9753
                                                  • Instruction ID: 496b4fc022c6f561a9cbce29c40f17c6fc06c16dd7425c2a0aabbd6ce5464c93
                                                  • Opcode Fuzzy Hash: 1594a7efe7cc0a45c26014e52a47b750353d709dbdca0224a918f3e6b78f9753
                                                  • Instruction Fuzzy Hash: 5EF0A072D1868C9FDB419B3898190A87FA0EF69220F5901E7D408CB0A2EA3469598351
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 731b50c3525a326509277e12488d81f03cbdf70423c0114abc5c50c097b95281
                                                  • Instruction ID: 26af9fdcee751844c86d8d370fa9309a1a4ae0773bc590e7091dcf2a7ce9ff6a
                                                  • Opcode Fuzzy Hash: 731b50c3525a326509277e12488d81f03cbdf70423c0114abc5c50c097b95281
                                                  • Instruction Fuzzy Hash: E901D670A1A7C58FD3669F34A4243E67BE1EF56354F1904AED089CB3A3CA365404CB52
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5ac5c07cb503521f5a3861a7f453dfcd78fe0bd3c15776763f104a69e2a0e670
                                                  • Instruction ID: 9744f60f967f7a6de6a37b5284abf8e804f8bd4292390471443244cc467ceba2
                                                  • Opcode Fuzzy Hash: 5ac5c07cb503521f5a3861a7f453dfcd78fe0bd3c15776763f104a69e2a0e670
                                                  • Instruction Fuzzy Hash: 93F06230D08A498FEBA49F6884443AE76F1FF54360F440A79C00DE3192CF35A4898B01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000017.00000002.637998726.00007FF859070000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF859070000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_23_2_7ff859070000_Dwdsyugg.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 78b8f2656692f7c5fc0db5d6e02e649f1491536a7cb0865b0894041237e31361
                                                  • Instruction ID: bbfce429b4bf7d44aab6a65dc2455233cb909acc0eeb28ef26ddf8488b16f46e
                                                  • Opcode Fuzzy Hash: 78b8f2656692f7c5fc0db5d6e02e649f1491536a7cb0865b0894041237e31361
                                                  • Instruction Fuzzy Hash: A9B0123144054D8B8F00DF10E4110E83351EF45324B440465E40DC7461DF22692C8781
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%