Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
kyFBQxVbsg.exe

Overview

General Information

Sample Name:kyFBQxVbsg.exe
Analysis ID:652393
MD5:972334f0c55d0aeab0b32efe41ea3470
SHA1:e9097b5cd1f976ecaf0accedf14f1d22bd72e6fa
SHA256:eb91bf1e2eb3877f0942cef113bb0fb76e2c2fd2c2651dbf09f6da6df649e8fb
Tags:exeRATRemcosRAT
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Remcos RAT
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for dropped file
Contains functionality to steal Firefox passwords or cookies
Yara detected Costura Assembly Loader
Encrypted powershell cmdline option found
Machine Learning detection for sample
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Contains functionality to inject code into remote processes
Installs a global keyboard hook
Delayed program exit found
Contains functionality to steal Chrome passwords or cookies
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Antivirus or Machine Learning detection for unpacked file
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to enumerate running services
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Contains functionality to retrieve information about pressed keystrokes
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Internet Provider seen in connection with other malware
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to call native functions
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
Detected TCP or UDP traffic on non-standard ports
Contains functionality to download and launch executables
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to simulate mouse events

Classification

  • System is w10x64
  • kyFBQxVbsg.exe (PID: 6232 cmdline: "C:\Users\user\Desktop\kyFBQxVbsg.exe" MD5: 972334F0C55D0AEAB0B32EFE41EA3470)
    • powershell.exe (PID: 6288 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • InstallUtil.exe (PID: 2328 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
    • InstallUtil.exe (PID: 6528 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • Qerdo.exe (PID: 6216 cmdline: "C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe" MD5: 972334F0C55D0AEAB0B32EFE41EA3470)
    • InstallUtil.exe (PID: 2592 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
    • InstallUtil.exe (PID: 5836 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • Qerdo.exe (PID: 5652 cmdline: "C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe" MD5: 972334F0C55D0AEAB0B32EFE41EA3470)
    • InstallUtil.exe (PID: 4900 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
    • InstallUtil.exe (PID: 6304 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • cleanup
{"Version": "3.5.1 Pro", "Host:Port:Password": "nikahuve.ac.ug:6968:0kalskala.ac.ug:6968:0tuekisaa.ac.ug:6968:0parthaha.ac.ug:6968:0", "Assigned name": "06192022", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "cvxyttydfsgbghfgfhtd-RXTSAM", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "scxs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "forbas", "Keylog file max size": "0"}
SourceRuleDescriptionAuthorStrings
00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
    • 0x61100:$s1: \Classes\mscfile\shell\open\command
    • 0x61160:$s1: \Classes\mscfile\shell\open\command
    • 0x61148:$s2: eventvwr.exe
    00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
    • 0x62094:$str_a1: C:\Windows\System32\cmd.exe
    • 0x62010:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
    • 0x62010:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
    • 0x615f8:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
    • 0x61c50:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
    • 0x611f4:$str_b2: Executing file:
    • 0x621d8:$str_b3: GetDirectListeningPort
    • 0x61a10:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
    • 0x61c38:$str_b7: \update.vbs
    • 0x6121c:$str_b9: Downloaded file:
    • 0x61208:$str_b10: Downloading file:
    • 0x612ac:$str_b12: Failed to upload file:
    • 0x621a0:$str_b13: StartForward
    • 0x621c0:$str_b14: StopForward
    • 0x61be0:$str_b15: fso.DeleteFile "
    • 0x61b74:$str_b16: On Error Resume Next
    • 0x61c10:$str_b17: fso.DeleteFolder "
    • 0x6129c:$str_b18: Uploaded file:
    • 0x6125c:$str_b19: Unable to delete:
    • 0x61ba8:$str_b20: while fso.FileExists("
    • 0x61731:$str_c0: [Firefox StoredLogins not found]
    00000011.00000000.533973605.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000011.00000000.533973605.0000000000400000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
      • 0x61100:$s1: \Classes\mscfile\shell\open\command
      • 0x61160:$s1: \Classes\mscfile\shell\open\command
      • 0x61148:$s2: eventvwr.exe
      Click to see the 97 entries
      SourceRuleDescriptionAuthorStrings
      17.0.InstallUtil.exe.400000.5.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
        17.0.InstallUtil.exe.400000.5.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
        • 0x61100:$s1: \Classes\mscfile\shell\open\command
        • 0x61160:$s1: \Classes\mscfile\shell\open\command
        • 0x61148:$s2: eventvwr.exe
        17.0.InstallUtil.exe.400000.5.raw.unpackREMCOS_RAT_variantsunknownunknown
        • 0x62094:$str_a1: C:\Windows\System32\cmd.exe
        • 0x62010:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x62010:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x615f8:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x61c50:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x611f4:$str_b2: Executing file:
        • 0x621d8:$str_b3: GetDirectListeningPort
        • 0x61a10:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x61c38:$str_b7: \update.vbs
        • 0x6121c:$str_b9: Downloaded file:
        • 0x61208:$str_b10: Downloading file:
        • 0x612ac:$str_b12: Failed to upload file:
        • 0x621a0:$str_b13: StartForward
        • 0x621c0:$str_b14: StopForward
        • 0x61be0:$str_b15: fso.DeleteFile "
        • 0x61b74:$str_b16: On Error Resume Next
        • 0x61c10:$str_b17: fso.DeleteFolder "
        • 0x6129c:$str_b18: Uploaded file:
        • 0x6125c:$str_b19: Unable to delete:
        • 0x61ba8:$str_b20: while fso.FileExists("
        • 0x61731:$str_c0: [Firefox StoredLogins not found]
        24.2.Qerdo.exe.5440000.4.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          24.2.Qerdo.exe.5440000.4.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
          • 0x5b6a2:$s1: file:///
          • 0x5b5fe:$s2: {11111-22222-10009-11112}
          • 0x5b632:$s3: {11111-22222-50001-00000}
          • 0x58303:$s4: get_Module
          • 0x5841f:$s5: Reverse
          • 0x59b22:$s6: BlockCopy
          • 0x5a1a4:$s7: ReadByte
          • 0x5b6b6:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
          Click to see the 187 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen
          Source: kyFBQxVbsg.exeVirustotal: Detection: 46%Perma Link
          Source: kyFBQxVbsg.exeReversingLabs: Detection: 57%
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.Qerdo.exe.40dfb10.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.Qerdo.exe.35cfb10.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.Qerdo.exe.40dfb10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.kyFBQxVbsg.exe.38cfb10.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.kyFBQxVbsg.exe.38cfb10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.Qerdo.exe.35cfb10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.533973605.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.594041394.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.601490372.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.612287399.00000000040DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.592527384.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.536706156.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.533640248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.534323754.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.591921739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000002.607934228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.598510412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.606949507.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.593660616.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.603389337.000000000352F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.645272430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541310066.000000000382F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.594464654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.595033873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.536064780.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.603526142.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.534848870.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.599641579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.599125899.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000002.596165958.0000000000BC7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.646242553.00000000011E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.612156985.000000000403F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541421315.00000000038CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.593157225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000002.608522925.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000002.595851570.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.606295959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.605837275.00000000035CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: kyFBQxVbsg.exe PID: 6232, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6528, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Qerdo.exe PID: 6216, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Qerdo.exe PID: 5652, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5836, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6304, type: MEMORYSTR
          Source: kyFBQxVbsg.exeAvira: detected
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeReversingLabs: Detection: 57%
          Source: kyFBQxVbsg.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeJoe Sandbox ML: detected
          Source: 26.2.InstallUtil.exe.400000.0.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 26.0.InstallUtil.exe.400000.1.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 26.0.InstallUtil.exe.400000.7.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 17.0.InstallUtil.exe.400000.8.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 0.2.kyFBQxVbsg.exe.2e0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
          Source: 28.0.InstallUtil.exe.400000.5.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 26.0.InstallUtil.exe.400000.0.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 17.0.InstallUtil.exe.400000.2.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 17.0.InstallUtil.exe.400000.3.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 17.0.InstallUtil.exe.400000.4.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 19.2.Qerdo.exe.40000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
          Source: 28.0.InstallUtil.exe.400000.3.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 17.0.InstallUtil.exe.400000.7.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 28.0.InstallUtil.exe.400000.7.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 17.0.InstallUtil.exe.400000.1.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 26.0.InstallUtil.exe.400000.2.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 17.0.InstallUtil.exe.400000.6.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 19.0.Qerdo.exe.40000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
          Source: 28.2.InstallUtil.exe.400000.0.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 28.0.InstallUtil.exe.400000.4.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 17.0.InstallUtil.exe.400000.5.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 28.0.InstallUtil.exe.400000.6.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 24.2.Qerdo.exe.9a0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
          Source: 28.0.InstallUtil.exe.400000.1.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 26.0.InstallUtil.exe.400000.8.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 24.0.Qerdo.exe.9a0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
          Source: 26.0.InstallUtil.exe.400000.5.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 17.2.InstallUtil.exe.400000.0.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 0.0.kyFBQxVbsg.exe.2e0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
          Source: 17.0.InstallUtil.exe.400000.0.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 28.0.InstallUtil.exe.400000.0.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 26.0.InstallUtil.exe.400000.6.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 26.0.InstallUtil.exe.400000.4.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 28.0.InstallUtil.exe.400000.2.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 28.0.InstallUtil.exe.400000.8.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 26.0.InstallUtil.exe.400000.3.unpackAvira: Label: BDS/Backdoor.Gen
          Source: 26.2.InstallUtil.exe.400000.0.unpackMalware Configuration Extractor: Remcos {"Version": "3.5.1 Pro", "Host:Port:Password": "nikahuve.ac.ug:6968:0kalskala.ac.ug:6968:0tuekisaa.ac.ug:6968:0parthaha.ac.ug:6968:0", "Assigned name": "06192022", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "AppData", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "cvxyttydfsgbghfgfhtd-RXTSAM", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "scxs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "notepad;solitaire;", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio path": "AppData", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "forbas", "Keylog file max size": "0"}
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00430185 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,
          Source: kyFBQxVbsg.exe, 00000000.00000002.541310066.000000000382F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----
          Source: kyFBQxVbsg.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: kyFBQxVbsg.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: protobuf-net.pdbSHA256 source: kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: protobuf-net.pdb source: kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmp
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00406571 SetEvent,ShellExecuteW,GetLogicalDriveStringsA,GetFileAttributesW,DeleteFileW,Sleep,StrToIntA,CreateDirectoryW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0040A1C4 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0040620E FindFirstFileW,FindNextFileW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_004162EF FindFirstFileW,FindNextFileW,FindNextFileW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0040A3CB FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0044A569 FindFirstFileExA,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_004187B1 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00407AC0 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00407ED2 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00406EEF __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,

          Networking

          barindex
          Source: Malware configuration extractorURLs: nikahuve.ac.ug
          Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
          Source: Joe Sandbox ViewIP Address: 194.5.98.107 194.5.98.107
          Source: global trafficTCP traffic: 192.168.2.6:49798 -> 194.5.98.107:6968
          Source: InstallUtil.exeString found in binary or memory: http://geoplugin.net/json.gp
          Source: kyFBQxVbsg.exe, 00000000.00000002.541310066.000000000382F000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000002.541421315.00000000038CF000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 00000011.00000000.533640248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 00000011.00000002.645272430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000002.603389337.000000000352F000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000002.605837275.00000000035CF000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000002.612287399.00000000040DF000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000002.612156985.000000000403F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001A.00000000.594041394.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 0000001A.00000000.591921739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 0000001A.00000002.595851570.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 0000001C.00000000.601490372.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 0000001C.00000002.607934228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 0000001C.00000000.598510412.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
          Source: kyFBQxVbsg.exe, 00000000.00000002.540068634.000000000269C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
          Source: kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
          Source: kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
          Source: kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
          Source: kyFBQxVbsg.exe, 00000000.00000002.540068634.000000000269C000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000002.597952189.000000000239C000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000002.610776047.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
          Source: kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
          Source: unknownDNS traffic detected: queries for: nikahuve.ac.ug
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0042386F recv,

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00408B9A GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00409D9C OpenClipboard,GetClipboardData,CloseClipboard,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00409D9C OpenClipboard,GetClipboardData,CloseClipboard,
          Source: Qerdo.exe, 00000013.00000002.597284812.0000000000878000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.Qerdo.exe.40dfb10.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.Qerdo.exe.35cfb10.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.Qerdo.exe.40dfb10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.kyFBQxVbsg.exe.38cfb10.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.kyFBQxVbsg.exe.38cfb10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.Qerdo.exe.35cfb10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.533973605.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.594041394.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.601490372.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.612287399.00000000040DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.592527384.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.536706156.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.533640248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.534323754.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.591921739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000002.607934228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.598510412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.606949507.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.593660616.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.603389337.000000000352F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.645272430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541310066.000000000382F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.594464654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.595033873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.536064780.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.603526142.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.534848870.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.599641579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.599125899.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000002.596165958.0000000000BC7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.646242553.00000000011E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.612156985.000000000403F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541421315.00000000038CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.593157225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000002.608522925.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000002.595851570.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.606295959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.605837275.00000000035CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: kyFBQxVbsg.exe PID: 6232, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6528, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Qerdo.exe PID: 6216, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Qerdo.exe PID: 5652, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5836, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6304, type: MEMORYSTR

          System Summary

          barindex
          Source: 17.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 24.2.Qerdo.exe.5440000.4.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 19.2.Qerdo.exe.48f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 19.2.Qerdo.exe.48f0000.4.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 24.2.Qerdo.exe.40dfb10.3.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 24.2.Qerdo.exe.40dfb10.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 19.2.Qerdo.exe.35cfb10.3.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 19.2.Qerdo.exe.35cfb10.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 24.2.Qerdo.exe.40dfb10.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 24.2.Qerdo.exe.40dfb10.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0.2.kyFBQxVbsg.exe.38cfb10.3.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0.2.kyFBQxVbsg.exe.38cfb10.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0.2.kyFBQxVbsg.exe.4ba0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0.2.kyFBQxVbsg.exe.4ba0000.4.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 17.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 17.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 24.2.Qerdo.exe.5440000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0.2.kyFBQxVbsg.exe.38cfb10.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0.2.kyFBQxVbsg.exe.38cfb10.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 28.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 28.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 26.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 26.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 19.2.Qerdo.exe.35cfb10.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 19.2.Qerdo.exe.35cfb10.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000011.00000000.533973605.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 00000011.00000000.533973605.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000001A.00000000.594041394.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001A.00000000.594041394.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000001C.00000000.601490372.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001C.00000000.601490372.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000001A.00000000.592527384.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001A.00000000.592527384.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000011.00000000.536706156.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 00000011.00000000.536706156.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000011.00000000.533640248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 00000011.00000000.533640248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000011.00000000.534323754.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 00000011.00000000.534323754.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000001A.00000000.591921739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001A.00000000.591921739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000001C.00000002.607934228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001C.00000002.607934228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000001C.00000000.598510412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001C.00000000.598510412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000001C.00000000.606949507.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001C.00000000.606949507.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000013.00000002.606363285.00000000048F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0000001A.00000000.593660616.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001A.00000000.593660616.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000011.00000002.645272430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 00000011.00000002.645272430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000001A.00000000.594464654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001A.00000000.594464654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000001A.00000000.595033873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001A.00000000.595033873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000011.00000000.536064780.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 00000011.00000000.536064780.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000000.00000002.541870137.0000000004BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0000001C.00000000.603526142.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001C.00000000.603526142.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000011.00000000.534848870.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 00000011.00000000.534848870.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000001C.00000000.599641579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001C.00000000.599641579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000001C.00000000.599125899.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001C.00000000.599125899.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000018.00000002.613026227.0000000005440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0000001A.00000000.593157225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001A.00000000.593157225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000001A.00000002.595851570.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001A.00000002.595851570.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0000001C.00000000.606295959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0000001C.00000000.606295959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: kyFBQxVbsg.exe, hlrb.csLarge array initialization: nakj: array initializer size 710623
          Source: 19.2.Qerdo.exe.40000.0.unpack, hlrb.csLarge array initialization: nakj: array initializer size 710623
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeCode function: 0_2_024AEAB8
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeCode function: 0_2_024ADA50
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeCode function: 0_2_024AD778
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00C8EAF7
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00C8AEC8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00C8AF53
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00C8768A
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00C87698
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00C8AF90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00435080
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0044F09C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0043420E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00430294
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_004422B0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00411466
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0041A4FE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0043C57C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00434643
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00424604
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_004496B9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0042476D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00432771
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0043C7AB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_004338FA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_004239CC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0043C9DA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00434A78
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0041BA96
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00433DF6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00423F5B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0044FF65
          Source: kyFBQxVbsg.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: Qerdo.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: kyFBQxVbsg.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 17.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 24.2.Qerdo.exe.5440000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 26.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 19.2.Qerdo.exe.48f0000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 26.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 19.2.Qerdo.exe.48f0000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 28.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 24.2.Qerdo.exe.40dfb10.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 24.2.Qerdo.exe.40dfb10.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 19.2.Qerdo.exe.35cfb10.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 19.2.Qerdo.exe.35cfb10.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 24.2.Qerdo.exe.40dfb10.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 24.2.Qerdo.exe.40dfb10.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0.2.kyFBQxVbsg.exe.38cfb10.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0.2.kyFBQxVbsg.exe.38cfb10.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0.2.kyFBQxVbsg.exe.4ba0000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 17.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0.2.kyFBQxVbsg.exe.4ba0000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 26.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 17.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 17.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 24.2.Qerdo.exe.5440000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 26.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0.2.kyFBQxVbsg.exe.38cfb10.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0.2.kyFBQxVbsg.exe.38cfb10.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 28.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 28.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 26.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 26.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 19.2.Qerdo.exe.35cfb10.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 19.2.Qerdo.exe.35cfb10.3.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000011.00000000.533973605.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 00000011.00000000.533973605.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000001A.00000000.594041394.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001A.00000000.594041394.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000001C.00000000.601490372.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001C.00000000.601490372.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000001A.00000000.592527384.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001A.00000000.592527384.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000011.00000000.536706156.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 00000011.00000000.536706156.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000011.00000000.533640248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 00000011.00000000.533640248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000011.00000000.534323754.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 00000011.00000000.534323754.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000001A.00000000.591921739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001A.00000000.591921739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000001C.00000002.607934228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001C.00000002.607934228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000001C.00000000.598510412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001C.00000000.598510412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000001C.00000000.606949507.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001C.00000000.606949507.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000013.00000002.606363285.00000000048F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0000001A.00000000.593660616.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001A.00000000.593660616.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000011.00000002.645272430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 00000011.00000002.645272430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000001A.00000000.594464654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001A.00000000.594464654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000001A.00000000.595033873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001A.00000000.595033873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000011.00000000.536064780.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 00000011.00000000.536064780.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000000.00000002.541870137.0000000004BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0000001C.00000000.603526142.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001C.00000000.603526142.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000011.00000000.534848870.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 00000011.00000000.534848870.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000001C.00000000.599641579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001C.00000000.599641579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000001C.00000000.599125899.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001C.00000000.599125899.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000018.00000002.613026227.0000000005440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0000001A.00000000.593157225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001A.00000000.593157225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000001A.00000002.595851570.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001A.00000002.595851570.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0000001C.00000000.606295959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0000001C.00000000.606295959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: String function: 004310BE appears 38 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: String function: 00402053 appears 50 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: String function: 00431740 appears 53 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00414EA8 CreateProcessW,CloseHandle,CloseHandle,CloseHandle,CloseHandle,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,TerminateProcess,SetThreadContext,ResumeThread,TerminateProcess,CloseHandle,CloseHandle,CloseHandle,
          Source: kyFBQxVbsg.exe, 00000000.00000002.540743790.0000000003687000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWoctlxtjcvxsj.dll" vs kyFBQxVbsg.exe
          Source: kyFBQxVbsg.exe, 00000000.00000003.526374372.0000000003850000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWoctlxtjcvxsj.dll" vs kyFBQxVbsg.exe
          Source: kyFBQxVbsg.exe, 00000000.00000000.371796335.0000000000392000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamerc.exe4 vs kyFBQxVbsg.exe
          Source: kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs kyFBQxVbsg.exe
          Source: kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs kyFBQxVbsg.exe
          Source: kyFBQxVbsg.exeBinary or memory string: OriginalFilenamerc.exe4 vs kyFBQxVbsg.exe
          Source: kyFBQxVbsg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: Qerdo.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: kyFBQxVbsg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeFile created: C:\Users\user\AppData\Roaming\PpjollpJump to behavior
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@18/10@117/1
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_004172C8 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00417CBB FindResourceA,LoadResource,LockResource,SizeofResource,
          Source: kyFBQxVbsg.exeVirustotal: Detection: 46%
          Source: kyFBQxVbsg.exeReversingLabs: Detection: 57%
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeFile read: C:\Users\user\Desktop\kyFBQxVbsg.exeJump to behavior
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\kyFBQxVbsg.exe "C:\Users\user\Desktop\kyFBQxVbsg.exe"
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe "C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe"
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe "C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe"
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00414706 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_esjq1xkt.ffx.ps1Jump to behavior
          Source: kyFBQxVbsg.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0040D3C8 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6424:120:WilError_01
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\cvxyttydfsgbghfgfhtd-RXTSAM
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: kyFBQxVbsg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: kyFBQxVbsg.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: protobuf-net.pdbSHA256 source: kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: protobuf-net.pdb source: kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 24.2.Qerdo.exe.5440000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.Qerdo.exe.48f0000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.Qerdo.exe.48f0000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.kyFBQxVbsg.exe.4ba0000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.kyFBQxVbsg.exe.4ba0000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.Qerdo.exe.5440000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000003.526374372.0000000003850000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.597952189.000000000239C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.606363285.00000000048F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.540068634.000000000269C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541870137.0000000004BA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000003.587908821.0000000004060000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000003.581326592.0000000003550000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.610776047.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.613026227.0000000005440000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: kyFBQxVbsg.exe PID: 6232, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Qerdo.exe PID: 6216, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Qerdo.exe PID: 5652, type: MEMORYSTR
          Source: kyFBQxVbsg.exe, hlrc.cs.Net Code: qmvy System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 19.2.Qerdo.exe.40000.0.unpack, hlrc.cs.Net Code: qmvy System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeCode function: 0_2_024A2827 push ebx; ret
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00C8FF5F push es; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_004594FD push esi; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00431786 push ecx; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00453798 push eax; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00452E76 push ecx; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0040CE58 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,
          Source: initial sampleStatic PE information: section name: .text entropy: 7.9984009418791
          Source: initial sampleStatic PE information: section name: .text entropy: 7.9984009418791
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeFile created: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeJump to dropped file
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00405CE1 ShellExecuteW,URLDownloadToFileW,
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run QerdoJump to behavior
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run QerdoJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_004172C8 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0040CE58 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0040D26E Sleep,ExitProcess,
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exe TID: 5096Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6656Thread sleep time: -1844674407370954s >= -30000s
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe TID: 6616Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe TID: 3488Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeLast function: Thread delayed
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6076
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1160
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00406571 SetEvent,ShellExecuteW,GetLogicalDriveStringsA,GetFileAttributesW,DeleteFileW,Sleep,StrToIntA,CreateDirectoryW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeAPI call chain: ExitProcess graph end node
          Source: powershell.exe, 00000003.00000003.515907401.000000000509E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V
          Source: InstallUtil.exe, 00000011.00000002.646242553.00000000011E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll%
          Source: powershell.exe, 00000003.00000003.515907401.000000000509E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: l:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess information queried: ProcessInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0040A1C4 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0040620E FindFirstFileW,FindNextFileW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_004162EF FindFirstFileW,FindNextFileW,FindNextFileW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0040A3CB FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0044A569 FindFirstFileExA,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_004187B1 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00407AC0 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00407ED2 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00406EEF __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0040CE58 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0043F394 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00431347 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0040F87E SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeMemory allocated: page read and write | page guard
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00431495 SetUnhandledExceptionFilter,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00431347 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00438462 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_0043190C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess created: Base64 decoded Start-Sleep -Seconds 10; Set-MpPreference -ExclusionPath 'C:\'
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess created: Base64 decoded Start-Sleep -Seconds 10; Set-MpPreference -ExclusionPath 'C:\'
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00414EA8 CreateProcessW,CloseHandle,CloseHandle,CloseHandle,CloseHandle,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,TerminateProcess,SetThreadContext,ResumeThread,TerminateProcess,CloseHandle,CloseHandle,CloseHandle,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,Sleep,CloseHandle,OpenProcess, \svchost.exe
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00415E25 mouse_event,
          Source: InstallUtil.exe, 00000011.00000002.646242553.00000000011E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: InstallUtil.exe, 00000011.00000002.646242553.00000000011E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager2ee70d
          Source: InstallUtil.exe, 00000011.00000002.646242553.00000000011E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: GetLocaleInfoW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: GetLocaleInfoW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: GetLocaleInfoA,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: EnumSystemLocalesW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: GetLocaleInfoW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: EnumSystemLocalesW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: EnumSystemLocalesW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: EnumSystemLocalesW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeQueries volume information: C:\Users\user\Desktop\kyFBQxVbsg.exe VolumeInformation
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeQueries volume information: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeQueries volume information: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00431590 cpuid
          Source: C:\Users\user\Desktop\kyFBQxVbsg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00404F28 GetLocalTime,CreateEventA,CreateThread,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_004451D0 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 17_2_00417E20 GetComputerNameExW,GetUserNameW,

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.Qerdo.exe.40dfb10.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.Qerdo.exe.35cfb10.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.Qerdo.exe.40dfb10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.kyFBQxVbsg.exe.38cfb10.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.kyFBQxVbsg.exe.38cfb10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.Qerdo.exe.35cfb10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.533973605.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.594041394.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.601490372.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.612287399.00000000040DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.592527384.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.536706156.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.533640248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.534323754.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.591921739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000002.607934228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.598510412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.606949507.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.593660616.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.603389337.000000000352F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.645272430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541310066.000000000382F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.594464654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.595033873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.536064780.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.603526142.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.534848870.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.599641579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.599125899.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000002.596165958.0000000000BC7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.646242553.00000000011E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.612156985.000000000403F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541421315.00000000038CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.593157225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000002.608522925.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000002.595851570.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.606295959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.605837275.00000000035CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: kyFBQxVbsg.exe PID: 6232, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6528, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Qerdo.exe PID: 6216, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Qerdo.exe PID: 5652, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5836, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6304, type: MEMORYSTR
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: \key3.db
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.Qerdo.exe.40dfb10.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.Qerdo.exe.35cfb10.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 24.2.Qerdo.exe.40dfb10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.2.InstallUtil.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.kyFBQxVbsg.exe.38cfb10.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 17.0.InstallUtil.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.kyFBQxVbsg.exe.38cfb10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 28.0.InstallUtil.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 26.0.InstallUtil.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 19.2.Qerdo.exe.35cfb10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.533973605.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.594041394.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.601490372.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.612287399.00000000040DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.592527384.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.536706156.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.533640248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.534323754.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.591921739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000002.607934228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.598510412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.606949507.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.593660616.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.603389337.000000000352F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.645272430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541310066.000000000382F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.594464654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.595033873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.536064780.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.603526142.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000000.534848870.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.599641579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.599125899.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000002.596165958.0000000000BC7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.646242553.00000000011E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000018.00000002.612156985.000000000403F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.541421315.00000000038CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000000.593157225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000002.608522925.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001A.00000002.595851570.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000001C.00000000.606295959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.605837275.00000000035CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: kyFBQxVbsg.exe PID: 6232, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6528, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Qerdo.exe PID: 6216, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Qerdo.exe PID: 5652, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5836, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6304, type: MEMORYSTR
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: cmd.exe
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Native API
          1
          Windows Service
          1
          Access Token Manipulation
          1
          Disable or Modify Tools
          1
          OS Credential Dumping
          2
          System Time Discovery
          Remote Services11
          Archive Collected Data
          Exfiltration Over Other Network Medium11
          Ingress Tool Transfer
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default Accounts1
          Command and Scripting Interpreter
          1
          Registry Run Keys / Startup Folder
          1
          Windows Service
          11
          Deobfuscate/Decode Files or Information
          121
          Input Capture
          1
          Account Discovery
          Remote Desktop Protocol121
          Input Capture
          Exfiltration Over Bluetooth2
          Encrypted Channel
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain Accounts2
          Service Execution
          Logon Script (Windows)122
          Process Injection
          3
          Obfuscated Files or Information
          2
          Credentials In Files
          1
          System Service Discovery
          SMB/Windows Admin Shares2
          Clipboard Data
          Automated Exfiltration1
          Non-Standard Port
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local Accounts1
          PowerShell
          Logon Script (Mac)1
          Registry Run Keys / Startup Folder
          13
          Software Packing
          NTDS3
          File and Directory Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer1
          Non-Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Masquerading
          LSA Secrets33
          System Information Discovery
          SSHKeyloggingData Transfer Size Limits11
          Application Layer Protocol
          Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common21
          Virtualization/Sandbox Evasion
          Cached Domain Credentials121
          Security Software Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items1
          Access Token Manipulation
          DCSync21
          Virtualization/Sandbox Evasion
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job122
          Process Injection
          Proc Filesystem3
          Process Discovery
          Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
          Application Window Discovery
          Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
          System Owner/User Discovery
          Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
          Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput Capture1
          Remote System Discovery
          Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 652393 Sample: kyFBQxVbsg.exe Startdate: 26/06/2022 Architecture: WINDOWS Score: 100 40 tuekisaa.ac.ug 2->40 42 parthaha.ac.ug 2->42 44 2 other IPs or domains 2->44 62 Malicious sample detected (through community Yara rule) 2->62 64 Antivirus / Scanner detection for submitted sample 2->64 66 Multi AV Scanner detection for submitted file 2->66 68 6 other signatures 2->68 8 kyFBQxVbsg.exe 1 5 2->8         started        12 Qerdo.exe 1 2->12         started        14 Qerdo.exe 2->14         started        signatures3 process4 file5 34 C:\Users\user\AppData\Roaming\...\Qerdo.exe, PE32 8->34 dropped 36 C:\Users\user\...\Qerdo.exe:Zone.Identifier, ASCII 8->36 dropped 38 C:\Users\user\AppData\...\kyFBQxVbsg.exe.log, ASCII 8->38 dropped 70 Encrypted powershell cmdline option found 8->70 16 InstallUtil.exe 8->16         started        19 InstallUtil.exe 2 3 8->19         started        22 powershell.exe 23 8->22         started        72 Antivirus detection for dropped file 12->72 74 Multi AV Scanner detection for dropped file 12->74 76 Machine Learning detection for dropped file 12->76 24 InstallUtil.exe 12->24         started        26 InstallUtil.exe 12->26         started        28 InstallUtil.exe 14->28         started        30 InstallUtil.exe 14->30         started        signatures6 process7 dnsIp8 52 Contains functionality to steal Chrome passwords or cookies 16->52 54 Contains functionality to inject code into remote processes 16->54 56 Contains functionality to steal Firefox passwords or cookies 16->56 58 Delayed program exit found 16->58 46 nikahuve.ac.ug 194.5.98.107, 49798, 49801, 49803 DANILENKODE Netherlands 19->46 48 tuekisaa.ac.ug 19->48 50 2 other IPs or domains 19->50 60 Installs a global keyboard hook 19->60 32 conhost.exe 22->32         started        signatures9 process10

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          kyFBQxVbsg.exe46%VirustotalBrowse
          kyFBQxVbsg.exe58%ReversingLabsByteCode-MSIL.Downloader.Seraph
          kyFBQxVbsg.exe100%AviraTR/Dropper.MSIL.Gen
          kyFBQxVbsg.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe100%AviraTR/Dropper.MSIL.Gen
          C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe58%ReversingLabsByteCode-MSIL.Downloader.Seraph
          SourceDetectionScannerLabelLinkDownload
          26.2.InstallUtil.exe.400000.0.unpack100%AviraBDS/Backdoor.GenDownload File
          26.0.InstallUtil.exe.400000.1.unpack100%AviraBDS/Backdoor.GenDownload File
          26.0.InstallUtil.exe.400000.7.unpack100%AviraBDS/Backdoor.GenDownload File
          17.0.InstallUtil.exe.400000.8.unpack100%AviraBDS/Backdoor.GenDownload File
          0.2.kyFBQxVbsg.exe.2e0000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
          28.0.InstallUtil.exe.400000.5.unpack100%AviraBDS/Backdoor.GenDownload File
          26.0.InstallUtil.exe.400000.0.unpack100%AviraBDS/Backdoor.GenDownload File
          17.0.InstallUtil.exe.400000.2.unpack100%AviraBDS/Backdoor.GenDownload File
          17.0.InstallUtil.exe.400000.3.unpack100%AviraBDS/Backdoor.GenDownload File
          17.0.InstallUtil.exe.400000.4.unpack100%AviraBDS/Backdoor.GenDownload File
          19.2.Qerdo.exe.40000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
          28.0.InstallUtil.exe.400000.3.unpack100%AviraBDS/Backdoor.GenDownload File
          17.0.InstallUtil.exe.400000.7.unpack100%AviraBDS/Backdoor.GenDownload File
          28.0.InstallUtil.exe.400000.7.unpack100%AviraBDS/Backdoor.GenDownload File
          17.0.InstallUtil.exe.400000.1.unpack100%AviraBDS/Backdoor.GenDownload File
          26.0.InstallUtil.exe.400000.2.unpack100%AviraBDS/Backdoor.GenDownload File
          17.0.InstallUtil.exe.400000.6.unpack100%AviraBDS/Backdoor.GenDownload File
          19.0.Qerdo.exe.40000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
          28.2.InstallUtil.exe.400000.0.unpack100%AviraBDS/Backdoor.GenDownload File
          28.0.InstallUtil.exe.400000.4.unpack100%AviraBDS/Backdoor.GenDownload File
          17.0.InstallUtil.exe.400000.5.unpack100%AviraBDS/Backdoor.GenDownload File
          28.0.InstallUtil.exe.400000.6.unpack100%AviraBDS/Backdoor.GenDownload File
          24.2.Qerdo.exe.9a0000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
          28.0.InstallUtil.exe.400000.1.unpack100%AviraBDS/Backdoor.GenDownload File
          26.0.InstallUtil.exe.400000.8.unpack100%AviraBDS/Backdoor.GenDownload File
          24.0.Qerdo.exe.9a0000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
          26.0.InstallUtil.exe.400000.5.unpack100%AviraBDS/Backdoor.GenDownload File
          17.2.InstallUtil.exe.400000.0.unpack100%AviraBDS/Backdoor.GenDownload File
          0.0.kyFBQxVbsg.exe.2e0000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
          17.0.InstallUtil.exe.400000.0.unpack100%AviraBDS/Backdoor.GenDownload File
          28.0.InstallUtil.exe.400000.0.unpack100%AviraBDS/Backdoor.GenDownload File
          26.0.InstallUtil.exe.400000.6.unpack100%AviraBDS/Backdoor.GenDownload File
          26.0.InstallUtil.exe.400000.4.unpack100%AviraBDS/Backdoor.GenDownload File
          28.0.InstallUtil.exe.400000.2.unpack100%AviraBDS/Backdoor.GenDownload File
          28.0.InstallUtil.exe.400000.8.unpack100%AviraBDS/Backdoor.GenDownload File
          26.0.InstallUtil.exe.400000.3.unpack100%AviraBDS/Backdoor.GenDownload File
          SourceDetectionScannerLabelLink
          nikahuve.ac.ug4%VirustotalBrowse
          tuekisaa.ac.ug2%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://geoplugin.net/json.gp0%URL Reputationsafe
          http://geoplugin.net/json.gp/C0%URL Reputationsafe
          nikahuve.ac.ug0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          nikahuve.ac.ug
          194.5.98.107
          truetrueunknown
          tuekisaa.ac.ug
          unknown
          unknowntrueunknown
          parthaha.ac.ug
          unknown
          unknowntrue
            unknown
            kalskala.ac.ug
            unknown
            unknowntrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              nikahuve.ac.ugtrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://geoplugin.net/json.gpInstallUtil.exefalse
              • URL Reputation: safe
              unknown
              https://github.com/mgravell/protobuf-netkyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://github.com/mgravell/protobuf-netikyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://stackoverflow.com/q/14436606/23354kyFBQxVbsg.exe, 00000000.00000002.540068634.000000000269C000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000002.597952189.000000000239C000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000002.610776047.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://github.com/mgravell/protobuf-netJkyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://geoplugin.net/json.gp/CkyFBQxVbsg.exe, 00000000.00000002.541310066.000000000382F000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000002.541421315.00000000038CF000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 00000011.00000000.533640248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 00000011.00000002.645272430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000002.603389337.000000000352F000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000002.605837275.00000000035CF000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000002.612287399.00000000040DF000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000002.612156985.000000000403F000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001A.00000000.594041394.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 0000001A.00000000.591921739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 0000001A.00000002.595851570.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 0000001C.00000000.601490372.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 0000001C.00000002.607934228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 0000001C.00000000.598510412.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namekyFBQxVbsg.exe, 00000000.00000002.540068634.000000000269C000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://stackoverflow.com/q/11564914/23354;kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://stackoverflow.com/q/2152978/23354kyFBQxVbsg.exe, 00000000.00000003.526677018.000000000398E000.00000004.00000800.00020000.00000000.sdmp, kyFBQxVbsg.exe, 00000000.00000003.526824087.0000000003A06000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582007777.000000000368E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000013.00000003.582307729.0000000003706000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588674839.000000000419E000.00000004.00000800.00020000.00000000.sdmp, Qerdo.exe, 00000018.00000003.588792827.0000000004216000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            194.5.98.107
                            nikahuve.ac.ugNetherlands
                            208476DANILENKODEtrue
                            Joe Sandbox Version:35.0.0 Citrine
                            Analysis ID:652393
                            Start date and time: 26/06/202209:43:272022-06-26 09:43:27 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 12m 36s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:kyFBQxVbsg.exe
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:29
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@18/10@117/1
                            EGA Information:
                            • Successful, ratio: 66.7%
                            HDC Information:
                            • Successful, ratio: 39.4% (good quality ratio 37.4%)
                            • Quality average: 83.7%
                            • Quality standard deviation: 26.4%
                            HCA Information:
                            • Successful, ratio: 98%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Adjust boot time
                            • Enable AMSI
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                            • TCP Packets have been reduced to 100
                            • Excluded IPs from analysis (whitelisted): 23.211.6.115
                            • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                            • Execution Graph export aborted for target powershell.exe, PID 6288 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtDeviceIoControlFile calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            TimeTypeDescription
                            09:45:12API Interceptor38x Sleep call for process: powershell.exe modified
                            09:45:54AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Qerdo "C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe"
                            09:46:02AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Qerdo "C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe"
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):805
                            Entropy (8bit):5.360596073797118
                            Encrypted:false
                            SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhIE4K5AE4Kzr7r1qE4j:MxHKXwYHKhQnoIHK5AHKzvr1qHj
                            MD5:EBFA21D930F1B37DA9DDD9D7E276F9DE
                            SHA1:E97B403CAA3A03D0E8BDAC6E66FFBE47555A38E5
                            SHA-256:5B9B2A9380AFEBEC985FA5745B9354DBBD4C889542B3EFE5446D24E8430A3752
                            SHA-512:13D58B48DB79A6D8A8851186ECD309BB22B859D1FC064B8E05108378F06A71110A1AAE5622E4C61DA201192809BE4910B86037BFC2E4F4261942D6E3EC11DC14
                            Malicious:false
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                            Process:C:\Users\user\Desktop\kyFBQxVbsg.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):805
                            Entropy (8bit):5.360596073797118
                            Encrypted:false
                            SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhIE4K5AE4Kzr7r1qE4j:MxHKXwYHKhQnoIHK5AHKzvr1qHj
                            MD5:EBFA21D930F1B37DA9DDD9D7E276F9DE
                            SHA1:E97B403CAA3A03D0E8BDAC6E66FFBE47555A38E5
                            SHA-256:5B9B2A9380AFEBEC985FA5745B9354DBBD4C889542B3EFE5446D24E8430A3752
                            SHA-512:13D58B48DB79A6D8A8851186ECD309BB22B859D1FC064B8E05108378F06A71110A1AAE5622E4C61DA201192809BE4910B86037BFC2E4F4261942D6E3EC11DC14
                            Malicious:true
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):14734
                            Entropy (8bit):4.993014478972177
                            Encrypted:false
                            SSDEEP:384:wZvOdB8Ypib4JNXp59HopbjvwRjdvRlAYotiQ0HzAF8:UvOdB8YNNZjHopbjoRjdvRlAYotinHzr
                            MD5:C5A56B913DEEDCF5AE01A2D4F8AA69CE
                            SHA1:C91D19BFD666FDD02B0739893833D4E1C0316511
                            SHA-256:1C5C865E5A98F33E277A81FCDADFBAB1367176BA14F8590022F7E5880161C00D
                            SHA-512:1058802FCD54817359F84977DD26AD4399C572910E67114F70B024EBADDF4E35E6AFF6461F90356205228B4B860E69392ABC27D38E284176C699916039CFA5ED
                            Malicious:false
                            Preview:PSMODULECACHE......#y;...Q...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitsTransfer\BitsTransfer.psd1........Start-BitsTransfer........Set-BitsTransfer........Get-BitsTransfer........Resume-BitsTransfer........Add-BitsFile........Suspend-BitsTransfer........Complete-BitsTransfer........Remove-BitsTransfer........-.^(...[...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\AppBackgroundTask\AppBackgroundTask.psd1....#...Set-AppBackgroundTaskResourcePolicy........Unregister-AppBackgroundTask........Get-AppBackgroundTask........tid........pfn........iru....%...Enable-AppBackgroundTaskDiagnosticLog........Start-AppBackgroundTask....&...Disable-AppBackgroundTaskDiagnosticLog.........w.e...a...C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\PackageManagement.psd1........Unregister-PackageSource........Save-Package........Install-PackageProvider........Find-PackageProvider........Install-Package........Get-PackageProvider........Get-Package........Unins
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):22176
                            Entropy (8bit):5.601138309758725
                            Encrypted:false
                            SSDEEP:384:5tCABCmzRYPvYAnISBKnLul/sp6vz1Nnqa9ZFtPV7I1WDuZ1v1I5+yYs:VgvBI4KLulcI7qOXNUvr+
                            MD5:EA4826E83AF1B21101CE6F68EF0B55C6
                            SHA1:0046E23F0CC87039F220713239AD6B86DE91ABF0
                            SHA-256:279B8D0ADA726FE5DFB5E6A238E2FFD2FE1A16F971BCFB6B41E4034E0CB9AA88
                            SHA-512:39BCC0A6DEA0B45B877F6DCEE5930E34C49B5034F56D0E08168CC525631DE76772ADA7DE79B28263240D4422AB47AF91E9A8917548E10224194D7B924D4C53EB
                            Malicious:false
                            Preview:@...e...........`...........>.3.0....................@..........H...............<@.^.L."My...::..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:very short file (no magic)
                            Category:dropped
                            Size (bytes):1
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3:U:U
                            MD5:C4CA4238A0B923820DCC509A6F75849B
                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                            Malicious:false
                            Preview:1
                            Process:C:\Users\user\Desktop\kyFBQxVbsg.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):735232
                            Entropy (8bit):7.987468698438195
                            Encrypted:false
                            SSDEEP:12288:9IxCLALqCddwA7Pljw5ej79G72AUBV3xaTPqfH0pLbwfBnC7aCNsuAIi6:9IxAgWA79Mq7s7ZUFV/IwfKagsWi6
                            MD5:972334F0C55D0AEAB0B32EFE41EA3470
                            SHA1:E9097B5CD1F976ECAF0ACCEDF14F1D22BD72E6FA
                            SHA-256:EB91BF1E2EB3877F0942CEF113BB0FB76E2C2FD2C2651DBF09F6DA6DF649E8FB
                            SHA-512:DF120F43FA17B2C37AD6D31E528495241146420CD017C18116BD074498CEF3834F408C50D289F8BDCE2955C464664A6C446800CB7B55C1461FB3CC0ACCC7FE10
                            Malicious:true
                            Antivirus:
                            • Antivirus: Avira, Detection: 100%
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 58%
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...#..b..............0......F........... ........@.. ....................................`.....................................O.... ...D........................................................................... ............... ..H............text........ ...................... ..`.rsrc....D... ...D..................@..@.reloc...............6..............@..B........................H.......................$$..............................................".(.....*".(.....*...0..g.........s......s........s....s........+..+.o....+.....+..o....+.,.+....o........+..o....+.,.+....,..o.......*..(......./..........:I..........RZ.......0.."........ .........%.....(......(.....+..*...0..L........s........o......s........o......o......!.,..o.......,..o.......,..o.......*.(.......)..........$4..........8?.......0..`.........(....(....o....(...+o.....+"..(.......o...
                            Process:C:\Users\user\Desktop\kyFBQxVbsg.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview:[ZoneTransfer]....ZoneId=0
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):234
                            Entropy (8bit):7.177722839093587
                            Encrypted:false
                            SSDEEP:6:6p288ILJoF861v83dMuVm6IRRqG6Q6P9SR2p6:6F8ILJoF8cv83uBRp6Qe9a2p6
                            MD5:0BC4CF36ABF59CC54AA5D472D55FAE99
                            SHA1:FE3A6EB4A46CA56C855CA308EC96838C96C63AA2
                            SHA-256:9E6854C21A182D3224B40053CEE8BCF8C6E055C08D7ECE2ED6CDD6F7090C048E
                            SHA-512:07028E2E89213CCB36A06968692D22F37452E22920C12B00C2B9503F22906388D1B1B07AAE92C43D675DD82C9BD2B019E53A298B23CEBEE26800B02855595FC6
                            Malicious:false
                            Preview:.j.V.J..!kU_..sY.[.t.....|]..%...*!.A].y..x......L.B......C.......=&f&..Vn.}...$.P....{j.gl.......Ni:.o.s./.=...fL...c..<.A..V1...4X>.".|.`....C..m7[u....$F')5..d..p;....2....MB.$..-..{o|{!uc..B.}...m....X8.0......7.@.....
                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):5978
                            Entropy (8bit):5.485342256824624
                            Encrypted:false
                            SSDEEP:96:BZ2TLZ+N3azqDo1ZVZVTLZ+N3azqDo1ZXvZprZkTLZ+N3azqDo1Z2wTTyZh:3acaJaq
                            MD5:34326C020EA634E84A3536E82DAFA6F8
                            SHA1:A2C2D2F602436AC220AE61B1F43ECBE10DFE8292
                            SHA-256:4DB38969B245E4F1E94BFE1254F2A77D386F07717A5D61F7B964F4F3D091C8B0
                            SHA-512:476601D408665AFBD80DFDE04925C9035E1FF99EAEBE0BBFD33AC61E67FA53977F87E0BEF0C3F7FA210B724D6FB12162690E3C89D2C83A04DCF4DC71B16CBA21
                            Malicious:false
                            Preview:.**********************..Windows PowerShell transcript start..Start time: 20220626094508..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 128757 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==..Process ID: 6288..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220626094509..**********************..PS>Start-Sleep -Seconds 10; Set-MpPreference -ExclusionPath 'C:\'..**********************..Windows PowerShell transcript start..Start
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.987468698438195
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                            • Win32 Executable (generic) a (10002005/4) 49.78%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Win16/32 Executable Delphi generic (2074/23) 0.01%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:kyFBQxVbsg.exe
                            File size:735232
                            MD5:972334f0c55d0aeab0b32efe41ea3470
                            SHA1:e9097b5cd1f976ecaf0accedf14f1d22bd72e6fa
                            SHA256:eb91bf1e2eb3877f0942cef113bb0fb76e2c2fd2c2651dbf09f6da6df649e8fb
                            SHA512:df120f43fa17b2c37ad6d31e528495241146420cd017c18116bd074498cef3834f408c50d289f8bdce2955c464664a6c446800cb7b55c1461fb3cc0accc7fe10
                            SSDEEP:12288:9IxCLALqCddwA7Pljw5ej79G72AUBV3xaTPqfH0pLbwfBnC7aCNsuAIi6:9IxAgWA79Mq7s7ZUFV/IwfKagsWi6
                            TLSH:67F423A18A0BDF5FE18F5ABB680452F7145CFE231240A318BA4173FE2EB354165E77A4
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...#..b..............0......F........... ........@.. ....................................`................................
                            Icon Hash:e4d8d8d8dc483196
                            Entrypoint:0x4b0ede
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x62B71A23 [Sat Jun 25 14:22:27 2022 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xb0e8c0x4f.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x4400.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xb80000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xaeee40xaf000False0.9951590401785714data7.9984009418791IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0xb20000x44000x4400False0.5211971507352942data5.8634338520962395IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xb80000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            RT_ICON0xb21600x568GLS_BINARY_LSB_FIRST
                            RT_ICON0xb26d80x1e0bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                            RT_ICON0xb44f40x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 0, next used block 0
                            RT_ICON0xb4dac0xea8data
                            RT_GROUP_ICON0xb5c640x3edata
                            RT_VERSION0xb5cb40x362data
                            RT_MANIFEST0xb60280x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampSource PortDest PortSource IPDest IP
                            Jun 26, 2022 09:45:59.625091076 CEST497986968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:45:59.667900085 CEST696849798194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:00.312700987 CEST497986968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:00.355405092 CEST696849798194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:00.919429064 CEST497986968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:00.964056969 CEST696849798194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:03.523972988 CEST498016968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:03.566504955 CEST696849801194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:04.126405954 CEST498016968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:04.168970108 CEST696849801194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:04.811012983 CEST498016968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:04.854006052 CEST696849801194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:07.212428093 CEST498036968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:07.255331993 CEST696849803194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:07.837601900 CEST498036968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:07.880376101 CEST696849803194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:08.428515911 CEST498036968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:08.471122980 CEST696849803194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:10.571124077 CEST498056968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:10.613929987 CEST696849805194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:11.219929934 CEST498056968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:11.262623072 CEST696849805194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:11.811450958 CEST498056968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:11.856297016 CEST696849805194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:14.949017048 CEST498096968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:14.993516922 CEST696849809194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:15.610732079 CEST498096968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:15.653306007 CEST696849809194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:16.219952106 CEST498096968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:16.262541056 CEST696849809194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:18.189363003 CEST498146968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:18.235021114 CEST696849814194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:18.923306942 CEST498146968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:18.967184067 CEST696849814194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:19.610862970 CEST498146968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:19.653702974 CEST696849814194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:21.858103037 CEST498306968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:21.900697947 CEST696849830194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:22.532982111 CEST498306968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:22.575666904 CEST696849830194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:23.126782894 CEST498306968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:23.169462919 CEST696849830194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:24.980937004 CEST498466968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:25.027003050 CEST696849846194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:25.567730904 CEST498466968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:25.610308886 CEST696849846194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:26.127068043 CEST498466968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:26.172544956 CEST696849846194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:27.845377922 CEST498596968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:27.888818979 CEST696849859194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:28.424082041 CEST498596968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:28.468168974 CEST696849859194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:29.111676931 CEST498596968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:29.154382944 CEST696849859194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:31.270693064 CEST498646968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:31.317832947 CEST696849864194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:31.924412966 CEST498646968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:31.967787981 CEST696849864194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:32.612035990 CEST498646968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:32.657620907 CEST696849864194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:34.441975117 CEST498666968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:34.488702059 CEST696849866194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:35.127840042 CEST498666968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:35.170638084 CEST696849866194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:35.737322092 CEST498666968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:35.783057928 CEST696849866194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:37.239804983 CEST498676968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:37.285552025 CEST696849867194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:37.799927950 CEST498676968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:37.842793941 CEST696849867194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:38.346894026 CEST498676968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:38.391542912 CEST696849867194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:40.412826061 CEST498686968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:40.455522060 CEST696849868194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:40.956468105 CEST498686968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:41.001518011 CEST696849868194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:41.503704071 CEST498686968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:41.548046112 CEST696849868194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:43.088099957 CEST498706968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:43.130824089 CEST696849870194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:43.644164085 CEST498706968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:43.690030098 CEST696849870194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:44.191082954 CEST498706968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:44.235831976 CEST696849870194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:45.616626024 CEST498716968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:45.663141966 CEST696849871194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:46.175681114 CEST498716968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:46.222079992 CEST696849871194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:46.722542048 CEST498716968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:46.767266035 CEST696849871194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:48.412889957 CEST498736968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:48.456914902 CEST696849873194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:49.097759962 CEST498736968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:49.142527103 CEST696849873194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:49.691560984 CEST498736968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:49.735557079 CEST696849873194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:51.152981997 CEST498746968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:51.197582960 CEST696849874194.5.98.107192.168.2.6
                            Jun 26, 2022 09:46:51.895008087 CEST498746968192.168.2.6194.5.98.107
                            Jun 26, 2022 09:46:51.940021992 CEST696849874194.5.98.107192.168.2.6
                            TimestampSource PortDest PortSource IPDest IP
                            Jun 26, 2022 09:45:59.455624104 CEST6264353192.168.2.68.8.8.8
                            Jun 26, 2022 09:45:59.609529972 CEST53626438.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:00.972532034 CEST5401553192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:01.287909031 CEST53540158.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:01.302423000 CEST5448953192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:01.668832064 CEST53544898.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:01.692954063 CEST5269853192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:02.335402966 CEST53526988.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:03.387541056 CEST6190153192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:03.521174908 CEST53619018.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:04.861490011 CEST5868953192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:05.224469900 CEST53586898.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:05.263015985 CEST5008153192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:05.407883883 CEST53500818.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:05.412870884 CEST4952053192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:05.879934072 CEST53495208.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:06.900013924 CEST6552653192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:07.183330059 CEST53655268.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:08.484833956 CEST5296553192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:08.825110912 CEST53529658.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:08.830322981 CEST5212553192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:09.151824951 CEST53521258.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:09.172702074 CEST6310453192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:09.415802002 CEST53631048.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:10.499820948 CEST5508353192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:10.522844076 CEST53550838.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:12.819227934 CEST5836053192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:13.254749060 CEST53583608.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:13.285218000 CEST5972453192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:13.417113066 CEST53597248.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:13.464816093 CEST5607153192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:13.861335993 CEST53560718.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:14.922063112 CEST6023853192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:14.943308115 CEST53602388.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:16.272790909 CEST6115253192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:16.600392103 CEST53611528.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:16.648164988 CEST4967953192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:16.668729067 CEST53496798.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:16.694027901 CEST6036153192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:17.050290108 CEST53603618.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:18.078138113 CEST6457953192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:18.172508955 CEST53645798.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:19.661204100 CEST4946353192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:19.946038008 CEST53494638.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:19.972764015 CEST5534253192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:20.489490032 CEST53553428.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:20.527023077 CEST6204153192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:20.808574915 CEST53620418.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:21.836281061 CEST6248353192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:21.855746031 CEST53624838.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:23.232126951 CEST5578853192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:23.251566887 CEST53557888.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:23.258554935 CEST6244853192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:23.277683020 CEST53624488.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:23.283349037 CEST5856353192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:23.900996923 CEST53585638.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:24.919173002 CEST5742253192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:24.938805103 CEST53574228.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:26.186084986 CEST6437553192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:26.206334114 CEST53643758.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:26.214508057 CEST6384453192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:26.233730078 CEST53638448.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:26.238574028 CEST5726953192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:26.787453890 CEST53572698.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:27.820296049 CEST4928753192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:27.842549086 CEST53492878.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:29.162329912 CEST6444253192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:29.182220936 CEST53644428.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:29.200381994 CEST5614653192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:29.220069885 CEST53561468.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:29.253309011 CEST5052053192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:29.535430908 CEST53505208.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:31.247152090 CEST5684553192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:31.267640114 CEST53568458.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:32.667778969 CEST5530053192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:33.007348061 CEST53553008.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:33.015280008 CEST5185353192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:33.037226915 CEST53518538.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:33.043329000 CEST6241753192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:33.318209887 CEST53624178.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:34.348625898 CEST6283453192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:34.429868937 CEST53628348.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:35.806056023 CEST6103753192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:35.827079058 CEST53610378.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:35.834036112 CEST5805353192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:35.855199099 CEST53580538.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:35.862826109 CEST5603153192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:36.128879070 CEST53560318.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:37.149254084 CEST5805453192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:37.234436989 CEST53580548.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:38.397241116 CEST5937453192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:38.417606115 CEST53593748.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:38.421745062 CEST4981553192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:38.926244020 CEST53498158.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:38.943577051 CEST5227753192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:39.367716074 CEST53522778.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:40.389466047 CEST4957253192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:40.409852028 CEST53495728.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:41.557739019 CEST5694953192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:41.579132080 CEST53569498.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:41.592691898 CEST6104153192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:41.702279091 CEST53610418.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:41.707015991 CEST5474953192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:42.044704914 CEST53547498.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:43.057265997 CEST5316953192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:43.077081919 CEST53531698.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:44.241111040 CEST5717953192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:44.260705948 CEST53571798.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:44.268326998 CEST5533153192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:44.287756920 CEST53553318.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:44.291924953 CEST6432553192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:44.559916019 CEST53643258.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:45.588435888 CEST5846853192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:45.608629942 CEST53584688.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:46.926189899 CEST5698453192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:46.948671103 CEST53569848.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:46.956815958 CEST5164053192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:46.984714985 CEST53516408.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:47.045470953 CEST6385253192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:47.373270035 CEST53638528.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:48.388694048 CEST5457053192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:48.407943964 CEST53545708.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:49.737145901 CEST5679353192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:49.756731033 CEST53567938.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:49.759732962 CEST6165153192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:49.778947115 CEST53616518.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:49.780446053 CEST5992553192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:50.115060091 CEST53599258.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:51.131019115 CEST6123653192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:51.151547909 CEST53612368.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:52.489573956 CEST4981153192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:52.510042906 CEST53498118.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:52.512449980 CEST6263953192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:52.535131931 CEST53626398.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:52.536928892 CEST5494553192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:52.786977053 CEST53549458.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:53.803354025 CEST5960353192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:53.820684910 CEST53596038.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:54.972790003 CEST5693953192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:54.992006063 CEST53569398.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:54.994334936 CEST5705953192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:55.012367964 CEST53570598.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:55.015356064 CEST5464753192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:55.273374081 CEST53546478.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:56.287367105 CEST5849053192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:56.363706112 CEST53584908.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:57.506583929 CEST5646553192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:57.528808117 CEST53564658.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:57.533893108 CEST6143653192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:57.558281898 CEST53614368.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:57.560184956 CEST5704853192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:57.833945036 CEST53570488.8.8.8192.168.2.6
                            Jun 26, 2022 09:46:58.850754976 CEST5455853192.168.2.68.8.8.8
                            Jun 26, 2022 09:46:58.872860909 CEST53545588.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:00.019772053 CEST5633353192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:00.037149906 CEST53563338.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:00.040926933 CEST5982453192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:00.062521935 CEST53598248.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:00.064255953 CEST6132853192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:00.309726000 CEST53613288.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:01.320076942 CEST5095953192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:01.341156960 CEST53509598.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:02.488662004 CEST5934453192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:02.832598925 CEST53593448.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:02.834417105 CEST5540353192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:02.853538036 CEST53554038.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:02.855746984 CEST5893853192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:03.110609055 CEST53589388.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:04.116741896 CEST5662553192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:04.133922100 CEST53566258.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:05.284356117 CEST5773153192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:05.592148066 CEST53577318.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:05.593838930 CEST4928253192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:05.879611015 CEST53492828.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:06.250915051 CEST6076053192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:06.517442942 CEST53607608.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:07.654623985 CEST6494153192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:07.788269043 CEST53649418.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:08.926732063 CEST5369053192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:09.216793060 CEST53536908.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:09.218846083 CEST6272353192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:09.236004114 CEST53627238.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:09.238074064 CEST5576053192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:09.571846008 CEST53557608.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:10.585858107 CEST6545253192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:10.603106976 CEST53654528.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:11.740303040 CEST6207953192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:12.141793966 CEST53620798.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:12.144227982 CEST5156653192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:12.163436890 CEST53515668.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:12.167809010 CEST5005053192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:12.589550972 CEST53500508.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:13.602176905 CEST5943953192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:13.621402979 CEST53594398.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:14.769234896 CEST6452953192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:14.788824081 CEST53645298.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:14.792699099 CEST5675953192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:15.098356962 CEST53567598.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:15.100631952 CEST6525253192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:15.432835102 CEST53652528.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:16.445960999 CEST6525053192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:16.467267990 CEST53652508.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:17.613542080 CEST6080153192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:17.630446911 CEST53608018.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:17.632636070 CEST6044653192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:17.920314074 CEST53604468.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:17.922254086 CEST5167153192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:18.181885004 CEST53516718.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:19.196216106 CEST5044253192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:19.217360020 CEST53504428.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:20.366450071 CEST5331453192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:20.387876034 CEST53533148.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:20.390060902 CEST6151653192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:20.411376953 CEST53615168.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:20.413465977 CEST5021353192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:20.685486078 CEST53502138.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:21.696197987 CEST6179353192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:21.717863083 CEST53617938.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:22.865897894 CEST5169953192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:22.973720074 CEST53516998.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:22.975537062 CEST5118553192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:22.995135069 CEST53511858.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:22.996891022 CEST5959453192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:23.260404110 CEST53595948.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:24.274667025 CEST5559153192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:24.294061899 CEST53555918.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:25.442476988 CEST5464653192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:25.462004900 CEST53546468.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:25.464106083 CEST6207053192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:25.483431101 CEST53620708.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:25.485399008 CEST6224353192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:25.728574991 CEST53622438.8.8.8192.168.2.6
                            Jun 26, 2022 09:47:26.744364023 CEST6319853192.168.2.68.8.8.8
                            Jun 26, 2022 09:47:26.764005899 CEST53631988.8.8.8192.168.2.6
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                            Jun 26, 2022 09:45:59.455624104 CEST192.168.2.68.8.8.80x98beStandard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:00.972532034 CEST192.168.2.68.8.8.80x629eStandard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:01.302423000 CEST192.168.2.68.8.8.80x8c38Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:01.692954063 CEST192.168.2.68.8.8.80xfc5bStandard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:03.387541056 CEST192.168.2.68.8.8.80x96b2Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:04.861490011 CEST192.168.2.68.8.8.80xad3dStandard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:05.263015985 CEST192.168.2.68.8.8.80xb7e9Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:05.412870884 CEST192.168.2.68.8.8.80x1817Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:06.900013924 CEST192.168.2.68.8.8.80x8ef1Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:08.484833956 CEST192.168.2.68.8.8.80xb4dStandard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:08.830322981 CEST192.168.2.68.8.8.80x6dc3Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:09.172702074 CEST192.168.2.68.8.8.80x3ad1Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:10.499820948 CEST192.168.2.68.8.8.80x4e28Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:12.819227934 CEST192.168.2.68.8.8.80x85c9Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:13.285218000 CEST192.168.2.68.8.8.80x2bbeStandard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:13.464816093 CEST192.168.2.68.8.8.80x2d75Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:14.922063112 CEST192.168.2.68.8.8.80x15d6Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:16.272790909 CEST192.168.2.68.8.8.80x3d72Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:16.648164988 CEST192.168.2.68.8.8.80x2cf7Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:16.694027901 CEST192.168.2.68.8.8.80x287eStandard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:18.078138113 CEST192.168.2.68.8.8.80x7860Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:19.661204100 CEST192.168.2.68.8.8.80x877bStandard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:19.972764015 CEST192.168.2.68.8.8.80xef63Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:20.527023077 CEST192.168.2.68.8.8.80xf017Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:21.836281061 CEST192.168.2.68.8.8.80xb0c3Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:23.232126951 CEST192.168.2.68.8.8.80xc28cStandard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:23.258554935 CEST192.168.2.68.8.8.80xc296Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:23.283349037 CEST192.168.2.68.8.8.80x5a53Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:24.919173002 CEST192.168.2.68.8.8.80xb170Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:26.186084986 CEST192.168.2.68.8.8.80x1c99Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:26.214508057 CEST192.168.2.68.8.8.80x86e5Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:26.238574028 CEST192.168.2.68.8.8.80xcd3Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:27.820296049 CEST192.168.2.68.8.8.80x62ccStandard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:29.162329912 CEST192.168.2.68.8.8.80x1261Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:29.200381994 CEST192.168.2.68.8.8.80xc2c3Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:29.253309011 CEST192.168.2.68.8.8.80x35a9Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:31.247152090 CEST192.168.2.68.8.8.80xa0eeStandard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:32.667778969 CEST192.168.2.68.8.8.80xa139Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:33.015280008 CEST192.168.2.68.8.8.80x5df0Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:33.043329000 CEST192.168.2.68.8.8.80x8bc1Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:34.348625898 CEST192.168.2.68.8.8.80x944eStandard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:35.806056023 CEST192.168.2.68.8.8.80x7aaaStandard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:35.834036112 CEST192.168.2.68.8.8.80xafcbStandard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:35.862826109 CEST192.168.2.68.8.8.80x1721Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:37.149254084 CEST192.168.2.68.8.8.80x8619Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:38.397241116 CEST192.168.2.68.8.8.80x2497Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:38.421745062 CEST192.168.2.68.8.8.80x118dStandard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:38.943577051 CEST192.168.2.68.8.8.80x2387Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:40.389466047 CEST192.168.2.68.8.8.80x7593Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:41.557739019 CEST192.168.2.68.8.8.80xd5eaStandard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:41.592691898 CEST192.168.2.68.8.8.80xe5ddStandard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:41.707015991 CEST192.168.2.68.8.8.80x240dStandard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:43.057265997 CEST192.168.2.68.8.8.80x9ca0Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:44.241111040 CEST192.168.2.68.8.8.80x9c48Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:44.268326998 CEST192.168.2.68.8.8.80x3757Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:44.291924953 CEST192.168.2.68.8.8.80x53ddStandard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:45.588435888 CEST192.168.2.68.8.8.80x2ff2Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:46.926189899 CEST192.168.2.68.8.8.80x6ffbStandard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:46.956815958 CEST192.168.2.68.8.8.80x23cdStandard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:47.045470953 CEST192.168.2.68.8.8.80x4316Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:48.388694048 CEST192.168.2.68.8.8.80x97c2Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:49.737145901 CEST192.168.2.68.8.8.80xdb06Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:49.759732962 CEST192.168.2.68.8.8.80x74d5Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:49.780446053 CEST192.168.2.68.8.8.80x30f5Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:51.131019115 CEST192.168.2.68.8.8.80x9b03Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:52.489573956 CEST192.168.2.68.8.8.80x6a72Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:52.512449980 CEST192.168.2.68.8.8.80x88faStandard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:52.536928892 CEST192.168.2.68.8.8.80x4f30Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:53.803354025 CEST192.168.2.68.8.8.80xf1b8Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:54.972790003 CEST192.168.2.68.8.8.80xa4b6Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:54.994334936 CEST192.168.2.68.8.8.80x3a03Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:55.015356064 CEST192.168.2.68.8.8.80xe6d2Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:56.287367105 CEST192.168.2.68.8.8.80x3ba8Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:57.506583929 CEST192.168.2.68.8.8.80x8265Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:57.533893108 CEST192.168.2.68.8.8.80x4e6dStandard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:57.560184956 CEST192.168.2.68.8.8.80xa2a0Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:58.850754976 CEST192.168.2.68.8.8.80x69caStandard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:00.019772053 CEST192.168.2.68.8.8.80xef71Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:00.040926933 CEST192.168.2.68.8.8.80x54fStandard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:00.064255953 CEST192.168.2.68.8.8.80x8b9Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:01.320076942 CEST192.168.2.68.8.8.80x2232Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:02.488662004 CEST192.168.2.68.8.8.80xf642Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:02.834417105 CEST192.168.2.68.8.8.80xe751Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:02.855746984 CEST192.168.2.68.8.8.80x878cStandard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:04.116741896 CEST192.168.2.68.8.8.80x9625Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:05.284356117 CEST192.168.2.68.8.8.80x196aStandard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:05.593838930 CEST192.168.2.68.8.8.80x5033Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:06.250915051 CEST192.168.2.68.8.8.80x9f4eStandard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:07.654623985 CEST192.168.2.68.8.8.80x74caStandard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:08.926732063 CEST192.168.2.68.8.8.80xd8f7Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:09.218846083 CEST192.168.2.68.8.8.80xed77Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:09.238074064 CEST192.168.2.68.8.8.80x8f1Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:10.585858107 CEST192.168.2.68.8.8.80xbd0eStandard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:11.740303040 CEST192.168.2.68.8.8.80x4e35Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:12.144227982 CEST192.168.2.68.8.8.80xe8faStandard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:12.167809010 CEST192.168.2.68.8.8.80xbac1Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:13.602176905 CEST192.168.2.68.8.8.80xad50Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:14.769234896 CEST192.168.2.68.8.8.80xd077Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:14.792699099 CEST192.168.2.68.8.8.80xfd7cStandard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:15.100631952 CEST192.168.2.68.8.8.80x54e4Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:16.445960999 CEST192.168.2.68.8.8.80xcfd7Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:17.613542080 CEST192.168.2.68.8.8.80xf6a9Standard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:17.632636070 CEST192.168.2.68.8.8.80xcfc1Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:17.922254086 CEST192.168.2.68.8.8.80xc18Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:19.196216106 CEST192.168.2.68.8.8.80x5d04Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:20.366450071 CEST192.168.2.68.8.8.80x951dStandard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:20.390060902 CEST192.168.2.68.8.8.80xad41Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:20.413465977 CEST192.168.2.68.8.8.80x8a5bStandard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:21.696197987 CEST192.168.2.68.8.8.80x549bStandard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:22.865897894 CEST192.168.2.68.8.8.80x72dfStandard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:22.975537062 CEST192.168.2.68.8.8.80x123Standard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:22.996891022 CEST192.168.2.68.8.8.80x5478Standard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:24.274667025 CEST192.168.2.68.8.8.80xdd42Standard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:25.442476988 CEST192.168.2.68.8.8.80xc3aeStandard query (0)kalskala.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:25.464106083 CEST192.168.2.68.8.8.80x699fStandard query (0)tuekisaa.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:25.485399008 CEST192.168.2.68.8.8.80xf0deStandard query (0)parthaha.ac.ugA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:26.744364023 CEST192.168.2.68.8.8.80x28dStandard query (0)nikahuve.ac.ugA (IP address)IN (0x0001)
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                            Jun 26, 2022 09:45:59.609529972 CEST8.8.8.8192.168.2.60x98beNo error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:01.287909031 CEST8.8.8.8192.168.2.60x629eName error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:01.668832064 CEST8.8.8.8192.168.2.60x8c38Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:02.335402966 CEST8.8.8.8192.168.2.60xfc5bServer failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:03.521174908 CEST8.8.8.8192.168.2.60x96b2No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:05.224469900 CEST8.8.8.8192.168.2.60xad3dName error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:05.407883883 CEST8.8.8.8192.168.2.60xb7e9Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:05.879934072 CEST8.8.8.8192.168.2.60x1817Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:07.183330059 CEST8.8.8.8192.168.2.60x8ef1No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:08.825110912 CEST8.8.8.8192.168.2.60xb4dName error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:09.151824951 CEST8.8.8.8192.168.2.60x6dc3Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:09.415802002 CEST8.8.8.8192.168.2.60x3ad1Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:10.522844076 CEST8.8.8.8192.168.2.60x4e28No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:13.254749060 CEST8.8.8.8192.168.2.60x85c9Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:13.417113066 CEST8.8.8.8192.168.2.60x2bbeName error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:13.861335993 CEST8.8.8.8192.168.2.60x2d75Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:14.943308115 CEST8.8.8.8192.168.2.60x15d6No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:16.600392103 CEST8.8.8.8192.168.2.60x3d72Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:16.668729067 CEST8.8.8.8192.168.2.60x2cf7Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:17.050290108 CEST8.8.8.8192.168.2.60x287eServer failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:18.172508955 CEST8.8.8.8192.168.2.60x7860No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:19.946038008 CEST8.8.8.8192.168.2.60x877bName error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:20.489490032 CEST8.8.8.8192.168.2.60xef63Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:20.808574915 CEST8.8.8.8192.168.2.60xf017Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:21.855746031 CEST8.8.8.8192.168.2.60xb0c3No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:23.251566887 CEST8.8.8.8192.168.2.60xc28cName error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:23.277683020 CEST8.8.8.8192.168.2.60xc296Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:23.900996923 CEST8.8.8.8192.168.2.60x5a53Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:24.938805103 CEST8.8.8.8192.168.2.60xb170No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:26.206334114 CEST8.8.8.8192.168.2.60x1c99Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:26.233730078 CEST8.8.8.8192.168.2.60x86e5Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:26.787453890 CEST8.8.8.8192.168.2.60xcd3Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:27.842549086 CEST8.8.8.8192.168.2.60x62ccNo error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:29.182220936 CEST8.8.8.8192.168.2.60x1261Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:29.220069885 CEST8.8.8.8192.168.2.60xc2c3Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:29.535430908 CEST8.8.8.8192.168.2.60x35a9Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:31.267640114 CEST8.8.8.8192.168.2.60xa0eeNo error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:33.007348061 CEST8.8.8.8192.168.2.60xa139Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:33.037226915 CEST8.8.8.8192.168.2.60x5df0Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:33.318209887 CEST8.8.8.8192.168.2.60x8bc1Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:34.429868937 CEST8.8.8.8192.168.2.60x944eNo error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:35.827079058 CEST8.8.8.8192.168.2.60x7aaaName error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:35.855199099 CEST8.8.8.8192.168.2.60xafcbName error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:36.128879070 CEST8.8.8.8192.168.2.60x1721Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:37.234436989 CEST8.8.8.8192.168.2.60x8619No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:38.417606115 CEST8.8.8.8192.168.2.60x2497Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:38.926244020 CEST8.8.8.8192.168.2.60x118dName error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:39.367716074 CEST8.8.8.8192.168.2.60x2387Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:40.409852028 CEST8.8.8.8192.168.2.60x7593No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:41.579132080 CEST8.8.8.8192.168.2.60xd5eaName error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:41.702279091 CEST8.8.8.8192.168.2.60xe5ddName error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:42.044704914 CEST8.8.8.8192.168.2.60x240dServer failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:43.077081919 CEST8.8.8.8192.168.2.60x9ca0No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:44.260705948 CEST8.8.8.8192.168.2.60x9c48Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:44.287756920 CEST8.8.8.8192.168.2.60x3757Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:44.559916019 CEST8.8.8.8192.168.2.60x53ddServer failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:45.608629942 CEST8.8.8.8192.168.2.60x2ff2No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:46.948671103 CEST8.8.8.8192.168.2.60x6ffbName error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:46.984714985 CEST8.8.8.8192.168.2.60x23cdName error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:47.373270035 CEST8.8.8.8192.168.2.60x4316Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:48.407943964 CEST8.8.8.8192.168.2.60x97c2No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:49.756731033 CEST8.8.8.8192.168.2.60xdb06Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:49.778947115 CEST8.8.8.8192.168.2.60x74d5Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:50.115060091 CEST8.8.8.8192.168.2.60x30f5Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:51.151547909 CEST8.8.8.8192.168.2.60x9b03No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:52.510042906 CEST8.8.8.8192.168.2.60x6a72Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:52.535131931 CEST8.8.8.8192.168.2.60x88faName error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:52.786977053 CEST8.8.8.8192.168.2.60x4f30Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:53.820684910 CEST8.8.8.8192.168.2.60xf1b8No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:54.992006063 CEST8.8.8.8192.168.2.60xa4b6Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:55.012367964 CEST8.8.8.8192.168.2.60x3a03Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:55.273374081 CEST8.8.8.8192.168.2.60xe6d2Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:56.363706112 CEST8.8.8.8192.168.2.60x3ba8No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:57.528808117 CEST8.8.8.8192.168.2.60x8265Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:57.558281898 CEST8.8.8.8192.168.2.60x4e6dName error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:57.833945036 CEST8.8.8.8192.168.2.60xa2a0Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:46:58.872860909 CEST8.8.8.8192.168.2.60x69caNo error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:00.037149906 CEST8.8.8.8192.168.2.60xef71Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:00.062521935 CEST8.8.8.8192.168.2.60x54fName error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:00.309726000 CEST8.8.8.8192.168.2.60x8b9Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:01.341156960 CEST8.8.8.8192.168.2.60x2232No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:02.832598925 CEST8.8.8.8192.168.2.60xf642Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:02.853538036 CEST8.8.8.8192.168.2.60xe751Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:03.110609055 CEST8.8.8.8192.168.2.60x878cServer failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:04.133922100 CEST8.8.8.8192.168.2.60x9625No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:05.592148066 CEST8.8.8.8192.168.2.60x196aName error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:05.879611015 CEST8.8.8.8192.168.2.60x5033Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:06.517442942 CEST8.8.8.8192.168.2.60x9f4eServer failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:07.788269043 CEST8.8.8.8192.168.2.60x74caNo error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:09.216793060 CEST8.8.8.8192.168.2.60xd8f7Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:09.236004114 CEST8.8.8.8192.168.2.60xed77Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:09.571846008 CEST8.8.8.8192.168.2.60x8f1Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:10.603106976 CEST8.8.8.8192.168.2.60xbd0eNo error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:12.141793966 CEST8.8.8.8192.168.2.60x4e35Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:12.163436890 CEST8.8.8.8192.168.2.60xe8faName error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:12.589550972 CEST8.8.8.8192.168.2.60xbac1Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:13.621402979 CEST8.8.8.8192.168.2.60xad50No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:14.788824081 CEST8.8.8.8192.168.2.60xd077Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:15.098356962 CEST8.8.8.8192.168.2.60xfd7cName error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:15.432835102 CEST8.8.8.8192.168.2.60x54e4Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:16.467267990 CEST8.8.8.8192.168.2.60xcfd7No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:17.630446911 CEST8.8.8.8192.168.2.60xf6a9Name error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:17.920314074 CEST8.8.8.8192.168.2.60xcfc1Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:18.181885004 CEST8.8.8.8192.168.2.60xc18Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:19.217360020 CEST8.8.8.8192.168.2.60x5d04No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:20.387876034 CEST8.8.8.8192.168.2.60x951dName error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:20.411376953 CEST8.8.8.8192.168.2.60xad41Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:20.685486078 CEST8.8.8.8192.168.2.60x8a5bServer failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:21.717863083 CEST8.8.8.8192.168.2.60x549bNo error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:22.973720074 CEST8.8.8.8192.168.2.60x72dfName error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:22.995135069 CEST8.8.8.8192.168.2.60x123Name error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:23.260404110 CEST8.8.8.8192.168.2.60x5478Server failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:24.294061899 CEST8.8.8.8192.168.2.60xdd42No error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:25.462004900 CEST8.8.8.8192.168.2.60xc3aeName error (3)kalskala.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:25.483431101 CEST8.8.8.8192.168.2.60x699fName error (3)tuekisaa.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:25.728574991 CEST8.8.8.8192.168.2.60xf0deServer failure (2)parthaha.ac.ugnonenoneA (IP address)IN (0x0001)
                            Jun 26, 2022 09:47:26.764005899 CEST8.8.8.8192.168.2.60x28dNo error (0)nikahuve.ac.ug194.5.98.107A (IP address)IN (0x0001)

                            Click to jump to process

                            Target ID:0
                            Start time:09:44:41
                            Start date:26/06/2022
                            Path:C:\Users\user\Desktop\kyFBQxVbsg.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\kyFBQxVbsg.exe"
                            Imagebase:0x2e0000
                            File size:735232 bytes
                            MD5 hash:972334F0C55D0AEAB0B32EFE41EA3470
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000003.526374372.0000000003850000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.540068634.000000000269C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.541310066.000000000382F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.541870137.0000000004BA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.541870137.0000000004BA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.541421315.00000000038CF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low

                            Target ID:3
                            Start time:09:44:48
                            Start date:26/06/2022
                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
                            Imagebase:0xf10000
                            File size:430592 bytes
                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Reputation:high

                            Target ID:5
                            Start time:09:44:49
                            Start date:26/06/2022
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6406f0000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:16
                            Start time:09:45:54
                            Start date:26/06/2022
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Imagebase:0x60000
                            File size:41064 bytes
                            MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:17
                            Start time:09:45:55
                            Start date:26/06/2022
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Imagebase:0xae0000
                            File size:41064 bytes
                            MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000011.00000000.535499326.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000000.533973605.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 00000011.00000000.533973605.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000011.00000000.533973605.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000000.536706156.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 00000011.00000000.536706156.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000011.00000000.536706156.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000000.533640248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 00000011.00000000.533640248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000011.00000000.533640248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000000.534323754.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 00000011.00000000.534323754.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000011.00000000.534323754.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.645272430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 00000011.00000002.645272430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000011.00000002.645272430.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000000.536064780.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 00000011.00000000.536064780.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000011.00000000.536064780.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000000.534848870.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 00000011.00000000.534848870.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000011.00000000.534848870.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000011.00000002.646242553.00000000011E8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high

                            Target ID:19
                            Start time:09:46:02
                            Start date:26/06/2022
                            Path:C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe"
                            Imagebase:0x40000
                            File size:735232 bytes
                            MD5 hash:972334F0C55D0AEAB0B32EFE41EA3470
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000013.00000002.597952189.000000000239C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000013.00000002.606363285.00000000048F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000013.00000002.606363285.00000000048F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000013.00000002.603389337.000000000352F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000013.00000003.581326592.0000000003550000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000013.00000002.605837275.00000000035CF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Antivirus matches:
                            • Detection: 100%, Avira
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 58%, ReversingLabs
                            Reputation:low

                            Target ID:24
                            Start time:09:46:12
                            Start date:26/06/2022
                            Path:C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\AppData\Roaming\Ppjollp\Qerdo.exe"
                            Imagebase:0x9a0000
                            File size:735232 bytes
                            MD5 hash:972334F0C55D0AEAB0B32EFE41EA3470
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000018.00000002.612287399.00000000040DF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000018.00000003.587908821.0000000004060000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000018.00000002.610776047.0000000002EAC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000018.00000002.612156985.000000000403F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000018.00000002.613026227.0000000005440000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000018.00000002.613026227.0000000005440000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                            Reputation:low

                            Target ID:25
                            Start time:09:46:20
                            Start date:26/06/2022
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Imagebase:0xe0000
                            File size:41064 bytes
                            MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:26
                            Start time:09:46:22
                            Start date:26/06/2022
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Imagebase:0x5d0000
                            File size:41064 bytes
                            MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000000.594041394.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001A.00000000.594041394.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001A.00000000.594041394.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000000.592527384.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001A.00000000.592527384.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001A.00000000.592527384.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000000.591921739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001A.00000000.591921739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001A.00000000.591921739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000000.593660616.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001A.00000000.593660616.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001A.00000000.593660616.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000000.594464654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001A.00000000.594464654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001A.00000000.594464654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000000.595033873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001A.00000000.595033873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001A.00000000.595033873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000002.596165958.0000000000BC7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000000.593157225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001A.00000000.593157225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001A.00000000.593157225.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001A.00000002.595851570.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001A.00000002.595851570.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001A.00000002.595851570.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            Reputation:high

                            Target ID:27
                            Start time:09:46:23
                            Start date:26/06/2022
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Imagebase:0x260000
                            File size:41064 bytes
                            MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:28
                            Start time:09:46:25
                            Start date:26/06/2022
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                            Imagebase:0x510000
                            File size:41064 bytes
                            MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001C.00000000.601490372.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001C.00000000.601490372.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001C.00000000.601490372.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001C.00000002.607934228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001C.00000002.607934228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001C.00000002.607934228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001C.00000000.598510412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001C.00000000.598510412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001C.00000000.598510412.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001C.00000000.606949507.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001C.00000000.606949507.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001C.00000000.606949507.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001C.00000000.603526142.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001C.00000000.603526142.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001C.00000000.603526142.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001C.00000000.599641579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001C.00000000.599641579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001C.00000000.599641579.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001C.00000000.599125899.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001C.00000000.599125899.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001C.00000000.599125899.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001C.00000002.608522925.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001C.00000000.606295959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000001C.00000000.606295959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000001C.00000000.606295959.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                            Reputation:high

                            No disassembly