Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Jaik.84784.3654.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Jaik.84784.3654.exe
Analysis ID:662065
MD5:74cd3c3d32dcf5029d1bc66347f44af7
SHA1:d7ec9719a6e5ea0b386ef590b1b74c317e597ff8
SHA256:cb943da125fde19e41c965a9f260caf79a6fca98c89b83bde609b843be0da377
Infos:

Detection

AsyncRAT, DcRat
Score:62
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected DcRat
Yara detected AsyncRAT
Antivirus detection for dropped file
Snort IDS alert for network traffic
Writes to foreign memory regions
Self deletion via cmd or bat file
Machine Learning detection for sample
Allocates memory in foreign processes
Uses ping.exe to check the status of other devices and networks
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
PE / OLE file has an invalid certificate
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64native
  • SecuriteInfo.com.Variant.Jaik.84784.3654.exe (PID: 7424 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe" MD5: 74CD3C3D32DCF5029D1BC66347F44AF7)
    • schtasks.exe (PID: 2612 cmdline: C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\user\AppVerif\DllHelper.exe MD5: 478BEAEC1C3A9417272BC8964ADD1CEE)
      • conhost.exe (PID: 740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • DllHelper.exe (PID: 7412 cmdline: "C:\Users\user\AppVerif\DllHelper.exe" MD5: BFEF1ABAB0ACACB7DC9D8828B32CFDE4)
      • InstallUtil.exe (PID: 8700 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
    • cmd.exe (PID: 8812 cmdline: C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • chcp.com (PID: 7520 cmdline: chcp 65001 MD5: 41146159AA3D41A92B53ED311EE15693)
      • PING.EXE (PID: 572 cmdline: ping 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • DllHelper.exe (PID: 7420 cmdline: C:\Users\user\AppVerif\DllHelper.exe MD5: BFEF1ABAB0ACACB7DC9D8828B32CFDE4)
    • InstallUtil.exe (PID: 9100 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • cleanup
{"Server": "137.74.157.86", "Ports": "4449", "Version": " 5.0.5", "Autorun": "false", "Install_Folder": "%AppData%", "Install_File": "", "AES_key": "AdlbMZFI5HbWg0iu5IqX0wSXQQa8QOLS", "Mutex": "ads3", "AntiDetection": "null", "External_config_on_Pastebin": "false", "BDOS": "1", "Startup_Delay": "zP7fPronnwucEY5Dp6OPgBbQxf8tJiPByXJ04rcWlJToRK/Y32OI2MU20Hq4rMVqVG/uL5FysKz/0xBrbRqJJA==", "HWID": "null", "Certificate": "MIICMzCCAZygAwIBAgIVALgbuadTIXCBGx92qk2Pt658vf8pMA0GCSqGSIb3DQEBDQUAMGcxGDAWBgNVBAMMD1Zlbm9tUkFUIFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTIxMDExMjE3MzIzNloXDTMxMTAyMjE3MzIzNlowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAPLknDSnzkq9SuHSkPVyOxBFVoX/n/Y/SNOD2TO9vxmiaLG1rfOcnt7KPbQA3CJxOmVjCVDvtURayayaErAu6R280hq1HgF3iL7u8+5R9XY6JvXkaiKj2rYiEVKKWU55xGCztKNQAfUY7prw8li8QJk+J8vzitqKS1zz7G2UcGx1AgMBAAGjMjAwMB0GA1UdDgQWBBSyJslOSHG/21uHIrLBFtFJb3nJHzAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAG/y6mnqPy3k1abtSAqAnm79siuBJ99b4uxdaTRVNIjATBtYUb3stSpQGefhnzNh4YS6w3SvTZk/BwuWyC0MKvHEbQhbk4JyoIcF4s2wzd5/mcTYK/kwPzAGUp+b93Fp38f3TRgFz+fWVZGheqUlWxzMzV1boXz2JX4pGQTypJBM", "ServerSignature": "eKZENGspnXkrDqiaf/g9a4bTxFDTrVNeU3cFp9wRLJ8NWVUlptiRl8ToeqRS9jPunWKEhdxjsDe0H4qXg9I+nnzookw2XZ89OySClh7WkoBOgKjFz5TA3lLa1ua13At2m1fLiobd36+By2SM4DBQNM+wHUj39Fa7aIAF+t1ovLo=", "Group": "false"}
SourceRuleDescriptionAuthorStrings
00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
      • 0xd0cc:$q1: Select * from Win32_CacheMemory
      • 0xd10c:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
      • 0xd15a:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
      • 0xd1a8:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
      00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Click to see the 21 entries
          SourceRuleDescriptionAuthorStrings
          24.2.DllHelper.exe.1551530.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            24.2.DllHelper.exe.1551530.1.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
              24.2.DllHelper.exe.1551530.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
              • 0xd0cc:$q1: Select * from Win32_CacheMemory
              • 0xd10c:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
              • 0xd15a:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
              • 0xd1a8:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
              25.3.DllHelper.exe.f110000.0.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                25.3.DllHelper.exe.f110000.0.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                  Click to see the 51 entries
                  No Sigma rule has matched
                  Timestamp:137.74.157.86192.168.11.204449497602848152 07/12/22-17:58:43.541738
                  SID:2848152
                  Source Port:4449
                  Destination Port:49760
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:137.74.157.86192.168.11.204449497602850454 07/12/22-17:58:43.541738
                  SID:2850454
                  Source Port:4449
                  Destination Port:49760
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeVirustotal: Detection: 58%Perma Link
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeReversingLabs: Detection: 69%
                  Source: C:\Users\user\AppVerif\DllHelper.exeAvira: detection malicious, Label: TR/Dropper.Gen7
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeJoe Sandbox ML: detected
                  Source: 00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "137.74.157.86", "Ports": "4449", "Version": " 5.0.5", "Autorun": "false", "Install_Folder": "%AppData%", "Install_File": "", "AES_key": "AdlbMZFI5HbWg0iu5IqX0wSXQQa8QOLS", "Mutex": "ads3", "AntiDetection": "null", "External_config_on_Pastebin": "false", "BDOS": "1", "Startup_Delay": "zP7fPronnwucEY5Dp6OPgBbQxf8tJiPByXJ04rcWlJToRK/Y32OI2MU20Hq4rMVqVG/uL5FysKz/0xBrbRqJJA==", "HWID": "null", "Certificate": "MIICMzCCAZygAwIBAgIVALgbuadTIXCBGx92qk2Pt658vf8pMA0GCSqGSIb3DQEBDQUAMGcxGDAWBgNVBAMMD1Zlbm9tUkFUIFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTIxMDExMjE3MzIzNloXDTMxMTAyMjE3MzIzNlowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAPLknDSnzkq9SuHSkPVyOxBFVoX/n/Y/SNOD2TO9vxmiaLG1rfOcnt7KPbQA3CJxOmVjCVDvtURayayaErAu6R280hq1HgF3iL7u8+5R9XY6JvXkaiKj2rYiEVKKWU55xGCztKNQAfUY7prw8li8QJk+J8vzitqKS1zz7G2UcGx1AgMBAAGjMjAwMB0GA1UdDgQWBBSyJslOSHG/21uHIrLBFtFJb3nJHzAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4GBAG/y6mnqPy3k1abtSAqAnm79siuBJ99b4uxdaTRVNIjATBtYUb3stSpQGefhnzNh4YS6w3SvTZk/BwuWyC0MKvHEbQhbk4JyoIcF4s2wzd5/mcTYK/kwPzAGUp+b93Fp38f3TRgFz+fWVZGheqUlWxzMzV1boXz2JX4pGQTypJBM", "ServerSignature": "eKZENGspnXkrDqiaf/g9a4bTxFDTrVNeU3cFp9wRLJ8NWVUlptiRl8ToeqRS9jPunWKEhdxjsDe0H4qXg9I+nnzookw2XZ89OySClh7WkoBOgKjFz5TA3lLa1ua13At2m1fLiobd36+By2SM4DBQNM+wHUj39Fa7aIAF+t1ovLo=", "Group": "false"}
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\pik vevaye\Wapawini\gal\Yim.pdb source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.dr
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03425906 FindFirstFileExW,
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034259BA FindFirstFileExW,FindNextFileW,FindClose,
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A8906 FindFirstFileExW,
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A89BA FindFirstFileExW,FindNextFileW,FindClose,

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2850454 ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT) 137.74.157.86:4449 -> 192.168.11.20:49760
                  Source: TrafficSnort IDS: 2848152 ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT Variant) 137.74.157.86:4449 -> 192.168.11.20:49760
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1
                  Source: Yara matchFile source: 24.2.DllHelper.exe.1551530.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.DllHelper.exe.ac1168.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.ac1168.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.1551530.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                  Source: global trafficTCP traffic: 192.168.11.20:49760 -> 137.74.157.86:4449
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: unknownTCP traffic detected without corresponding DNS query: 137.74.157.86
                  Source: InstallUtil.exe, 0000001E.00000003.2663058792.000000000104E000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000002.5743741822.0000000001051000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: InstallUtil.exe, 0000001E.00000003.2663058792.000000000104E000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000002.5743741822.0000000001051000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                  Source: InstallUtil.exe, 0000001E.00000003.2663058792.000000000104E000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000002.5743741822.0000000001051000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en$
                  Source: 77EC63BDA74BD0D0E0426DC8F8008506.30.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                  Source: InstallUtil.exe, 0000001E.00000003.2903386434.0000000001085000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000003.2663058792.000000000104E000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000002.5744623032.0000000001086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab.
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: http://s.symcd.com06
                  Source: InstallUtil.exe, 0000001E.00000002.5754333031.00000000030D0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000002.5747812323.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: https://d.symcb.com/cps0%
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.drString found in binary or memory: https://d.symcb.com/rpa0.

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: Yara matchFile source: 24.2.DllHelper.exe.1551530.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.DllHelper.exe.ac1168.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.ac1168.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.DllHelper.exe.ac1168.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.1551530.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.ac1168.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.1551530.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.2.DllHelper.exe.1551530.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000003.2304950340.0000000000AB2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001F.00000000.2292908991.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.5733215574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001F.00000000.2292384259.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000000.2255355229.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000003.2256208402.000000000DB32000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001F.00000002.2324411113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000000.2255974959.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.2306850553.0000000000AB2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000003.2265536971.0000000001540000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000003.2293118725.000000000F112000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000002.2270243732.0000000001540000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: DllHelper.exe PID: 7412, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: DllHelper.exe PID: 7420, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 8700, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 9100, type: MEMORYSTR

                  System Summary

                  barindex
                  Source: 24.2.DllHelper.exe.1551530.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 25.3.DllHelper.exe.f110000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 30.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 25.2.DllHelper.exe.ac1168.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 30.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 25.3.DllHelper.exe.ac1168.2.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 25.2.DllHelper.exe.ac1168.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 31.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 24.3.DllHelper.exe.db30000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 24.3.DllHelper.exe.1551530.2.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 25.3.DllHelper.exe.ac1168.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 25.3.DllHelper.exe.f110000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 31.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 24.3.DllHelper.exe.1551530.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 24.3.DllHelper.exe.db30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 24.2.DllHelper.exe.1551530.1.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 31.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 25.3.DllHelper.exe.f110000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 24.3.DllHelper.exe.db30000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 30.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: 00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 24.2.DllHelper.exe.1551530.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 25.3.DllHelper.exe.f110000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 30.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 25.2.DllHelper.exe.ac1168.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 30.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 25.3.DllHelper.exe.ac1168.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 25.2.DllHelper.exe.ac1168.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 31.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 24.3.DllHelper.exe.db30000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 24.3.DllHelper.exe.1551530.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 25.3.DllHelper.exe.ac1168.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 25.3.DllHelper.exe.f110000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 31.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 24.3.DllHelper.exe.1551530.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 24.3.DllHelper.exe.db30000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 24.2.DllHelper.exe.1551530.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 31.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 25.3.DllHelper.exe.f110000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 24.3.DllHelper.exe.db30000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 30.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: 00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CABAF0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CA2460
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CAAD10
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03399210
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033A4910
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03410B40
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E6B30
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FFB30
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340A360
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033BB310
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033D7B00
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033A4360
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E8B60
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03408B20
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340AB20
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340D320
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E7BAD
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0339C3B0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F7BB0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03352BA0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033B93A0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03398390
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033ED390
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340EBF0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F6B80
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340C390
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0333ABE0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033B43E0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EE3E0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E7BE0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03398BD0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034143B0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03398A00
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FDA70
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033D4A60
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E9A60
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F1250
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03417A30
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341BAC0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341F2C0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E5AB0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F02B0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034072D0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03406AD0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F4AA0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03409AE0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03412AE0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03339290
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03400AF0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03407A80
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032F0AE0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03399AE0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340B2A0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033D52D0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FEAD0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03403AB0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034132B0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03416AB0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EBAC0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033B5130
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FA930
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03413950
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341C950
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033B4920
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341B900
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FB970
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341A110
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EA950
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033B5940
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EF140
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0333A1B0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0342A1CC
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340B9D0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E81BD
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F99A0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034059E0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0339C190
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F7990
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03398180
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03419980
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033399F0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033D39E0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033531D0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033979D0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034029B0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033A21C0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EC1C0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E6830
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FC020
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340D860
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F5810
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FD010
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03398800
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EC800
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E306B
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F6870
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FC870
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03401810
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0333B060
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EE860
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03419020
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341B020
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03352850
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033ED040
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034118C0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034188C0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034200C0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0333A8A0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F88A0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340F8E0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E7890
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FD890
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340E880
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033B40F0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E58F0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03412890
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0339C8E0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340C8A0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341A8A0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EB8C0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03403740
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03408740
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0334C710
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F1F10
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FEF10
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E6718
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033B9700
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03400700
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FE770
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03403F10
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E4F60
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03417F20
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03417730
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341D7D0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03338FA0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03397FA0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033A1F90
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F4790
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341DFF0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033977F0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EDFF0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03401F90
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03410F90
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03415790
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EF7E0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FF7E0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033397D0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F27D0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034047B0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03404FB0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03416FB0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EFFC0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EC610
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340D670
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03416670
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033B3E00
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032DEE60
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03339E60
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F6E60
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034026C0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034106C0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034116C0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034146C0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03352EB0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E6EAB
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033D4EB0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E8EB0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E6EA0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034096F0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340A680
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341EE80
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03398EF0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E5EF0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E86F0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F36F0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03406690
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033426E0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E2EF6
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EAED0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F0ED0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340C6B0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E7EDB
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0339C6C0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03408550
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E3D35
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0333B510
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033D6510
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341C570
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03402D00
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03418D00
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FFD70
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03400D10
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033A4560
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341BD20
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F9550
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03405530
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03405DC0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F75B0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0333A5A0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F85A0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E7590
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F1590
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F4590
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F0580
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340B580
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033B4DF0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033E95F0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340F5A0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033ED5D0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EB5D0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034075B0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034125B0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03411C40
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03415440
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F5430
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03339C20
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E343D
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033B5C20
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E8C35
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F2420
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F8C20
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03413460
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341FC60
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0334C410
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F3410
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340E470
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341DC70
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EAC70
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FCC70
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03409410
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0333E460
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033EF460
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0340FC20
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03401C30
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341ECC0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033974B0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03397CB0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E2CA5
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FA4B0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033F9CB0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033B54A0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03339490
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_033FBC90
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03406CF0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0341ACF0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03404C80
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03419CA0
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E04C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_00FCBAF0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_00FC2460
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_00FCAD10
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034C8270
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351C210
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03527910
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03593B40
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03527360
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356BB60
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358D360
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0353E310
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0355AB00
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03569B30
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03582B30
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358BB20
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358DB20
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03590320
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351BBD0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03591BF0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034BDBE0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035373E0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356ABE0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035713E0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351B390
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03570390
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358F390
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03579B80
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351F3B0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357ABB0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035973B0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0346ABAD
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034D5BA0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0353C3A0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03574250
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03580A70
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03557A60
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356CA60
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351BA00
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359AA30
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035582D0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358A2D0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03581AD0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03589AD0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356EAC0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359EAC0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A22C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03473AE0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03583AF0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351CAE0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358CAE0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03595AE0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358AA80
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034BC290
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03568AB0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035732B0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03586AB0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035962B0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03599AB0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03577AA0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358E2A0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356D950
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03596950
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359F950
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03538940
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03572140
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357E970
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359D110
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359E900
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03538130
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357D930
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03537920
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351A9D0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358E9D0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035251C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356F1C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035AD1CC
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034D61D0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035569E0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035889E0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034BC9F0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351F190
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357A990
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351B180
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359C980
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035859B0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357C9A0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034BD1B0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0346B1BD
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03570040
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034D5850
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03579870
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357F870
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034BE060
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0346606B
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03571860
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03590860
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03578810
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03580010
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03584810
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351B800
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356F800
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03569830
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357F020
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359C020
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359E020
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356E8C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035948C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359B8C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A30C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035370F0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035688F0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351F8E0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035928E0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356A890
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03580890
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03595890
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03591880
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034BD8A0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357B8A0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358F8A0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359D8A0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03586740
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358B740
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03581770
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03567F60
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03574F10
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03581F10
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03586F10
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0353C700
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03583700
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034CF710
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03469718
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359A730
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359AF20
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035757D0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A07D0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03572FC0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034BC7D0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351A7F0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03570FF0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A0FF0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035727E0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035827E0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03524F90
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03577790
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03584F90
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03593F90
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03598790
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035877B0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03587FB0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03599FB0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034BBFA0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351AFA0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03461E60
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03590670
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03599670
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034BCE60
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03579E60
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356F610
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03536E00
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356DED0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03573ED0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351F6C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035856C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035936C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035946C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035976C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0346AEDB
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351BEF0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03568EF0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356B6F0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035766F0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358C6F0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034C56E0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03465EF6
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03589690
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358D680
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A1E80
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03557EB0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356BEB0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358F6B0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03469EAB
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03569EA0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034D5EB0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357C550
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358B550
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03582D70
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359F570
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03527560
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03559510
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03583D10
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03585D00
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359BD00
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034BE510
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03588530
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03466D35
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359ED20
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356E5D0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035705D0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03588DC0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03537DF0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356C5F0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356A590
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03574590
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03577590
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03573580
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358E580
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357A5B0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358A5B0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035955B0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034BD5A0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357B5A0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035925A0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03594C40
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03598440
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0356DC70
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357FC70
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03591470
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A0C70
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034C1460
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03572460
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03596460
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A2C60
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03576410
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0358C410
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034CF410
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03578430
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03584C30
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034BCC20
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03538C20
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0346BC35
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03575420
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357BC20
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03592C20
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0346643D
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034634C0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A1CC0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03589CF0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359DCF0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357EC90
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03587C80
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034BC490
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351A4B0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0351ACB0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03465CA5
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357D4B0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0357CCB0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035384A0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0359CCA0
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: String function: 00FC1290 appears 31 times
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: String function: 00FC09F0 appears 106 times
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: String function: 00FBD760 appears 144 times
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: String function: 00CA09F0 appears 106 times
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: String function: 00CA1290 appears 31 times
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: String function: 00C9D760 appears 144 times
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: DllHelper.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: DllHelper.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: DllHelper.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeSection loaded: edgegdi.dll
                  Source: C:\Users\user\AppVerif\DllHelper.exeSection loaded: edgegdi.dll
                  Source: C:\Users\user\AppVerif\DllHelper.exeSection loaded: edgegdi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: edgegdi.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: edgegdi.dll
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: invalid certificate
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: DllHelper.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeVirustotal: Detection: 58%
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeReversingLabs: Detection: 69%
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeJump to behavior
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe"
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\user\AppVerif\DllHelper.exe
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess created: C:\Users\user\AppVerif\DllHelper.exe "C:\Users\user\AppVerif\DllHelper.exe"
                  Source: unknownProcess created: C:\Users\user\AppVerif\DllHelper.exe C:\Users\user\AppVerif\DllHelper.exe
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1
                  Source: C:\Users\user\AppVerif\DllHelper.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  Source: C:\Users\user\AppVerif\DllHelper.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\user\AppVerif\DllHelper.exe
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess created: C:\Users\user\AppVerif\DllHelper.exe "C:\Users\user\AppVerif\DllHelper.exe"
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe
                  Source: C:\Users\user\AppVerif\DllHelper.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  Source: C:\Users\user\AppVerif\DllHelper.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeFile created: C:\Users\user\AppVerifJump to behavior
                  Source: classification engineClassification label: mal62.troj.evad.winEXE@18/4@0/2
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: 31.0.InstallUtil.exe.400000.0.unpack, Client/Helper/Methods.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 31.0.InstallUtil.exe.400000.0.unpack, Client/Helper/Methods.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 31.2.InstallUtil.exe.400000.0.unpack, Client/Helper/Methods.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 31.2.InstallUtil.exe.400000.0.unpack, Client/Helper/Methods.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 25.3.DllHelper.exe.f110000.1.unpack, Client/Helper/Methods.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 25.3.DllHelper.exe.f110000.1.unpack, Client/Helper/Methods.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 31.0.InstallUtil.exe.400000.1.unpack, Client/Helper/Methods.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 31.0.InstallUtil.exe.400000.1.unpack, Client/Helper/Methods.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 24.3.DllHelper.exe.db30000.1.unpack, Client/Helper/Methods.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 24.3.DllHelper.exe.db30000.1.unpack, Client/Helper/Methods.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 24.3.DllHelper.exe.db30000.0.unpack, Client/Helper/Methods.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 24.3.DllHelper.exe.db30000.0.unpack, Client/Helper/Methods.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 30.2.InstallUtil.exe.400000.0.unpack, Client/Helper/Methods.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 30.2.InstallUtil.exe.400000.0.unpack, Client/Helper/Methods.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 30.0.InstallUtil.exe.400000.1.unpack, Client/Helper/Methods.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 30.0.InstallUtil.exe.400000.1.unpack, Client/Helper/Methods.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 30.0.InstallUtil.exe.400000.0.unpack, Client/Helper/Methods.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                  Source: 30.0.InstallUtil.exe.400000.0.unpack, Client/Helper/Methods.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
                  Source: 24.3.DllHelper.exe.db30000.0.unpack, Client/Settings.csBase64 encoded string: 'yDdZmNkfICnnfuC9H5QR4RFB86NDbT3XnCucL8GcfsS2JAVnW7qRUSvi6lvtrenEU0O9gUO38K/9sI28+3KsTg==', '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', 'nS4Yc+OY1/qvAVhP34tJjSnKQWrVfQ0aImA+b5rs0NWBVvjPwnKAPJGG6ccEOr2hOni1HBRAxK/0Iwi/kuqlPNmK/VYZgIrk5NZ1T7/vonGL1qRwTTBgVOdmCCkLBdjLHSGa4rQ0+Nqh/XwSODQM5H2p4CQTZJhjbxPK8YBr5mG6Y0xDTEm7+ZaL6Fqp6saupv4mevxlwskEMtmQVLia8oQpIuMcRRly6uPox0GUHBPciJjc7LHai2zqGn5yRuUqL/2RmfXGwwK/AGJHS3/R5ZRZS87+J7Z6pgcWU5yLmvw=', '/jPX1RJwNWpAirraz2FbJo6iCtGJJi2Q5WObOWH4yj4oci4Mj6BIOcdeZgWtW2Kh2qXzbmhqPox2JlnZO1/+JQ==', 'zP7fPronnwucEY5Dp6OPgBbQxf8tJiPByXJ04rcWlJToRK/Y32OI2MU20Hq4rMVqVG/uL5FysKz/0xBrbRqJJA==', 'lW8eVMoJ3jWRjD7BEQaSo4kWGM+OXHFGi8PLIzxRfydciJv3rMY2KAP0Q3BrpiBG19NFZIr/UYitx0lSrGmc8w=='
                  Source: 24.3.DllHelper.exe.db30000.1.unpack, Client/Settings.csBase64 encoded string: 'yDdZmNkfICnnfuC9H5QR4RFB86NDbT3XnCucL8GcfsS2JAVnW7qRUSvi6lvtrenEU0O9gUO38K/9sI28+3KsTg==', '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', 'nS4Yc+OY1/qvAVhP34tJjSnKQWrVfQ0aImA+b5rs0NWBVvjPwnKAPJGG6ccEOr2hOni1HBRAxK/0Iwi/kuqlPNmK/VYZgIrk5NZ1T7/vonGL1qRwTTBgVOdmCCkLBdjLHSGa4rQ0+Nqh/XwSODQM5H2p4CQTZJhjbxPK8YBr5mG6Y0xDTEm7+ZaL6Fqp6saupv4mevxlwskEMtmQVLia8oQpIuMcRRly6uPox0GUHBPciJjc7LHai2zqGn5yRuUqL/2RmfXGwwK/AGJHS3/R5ZRZS87+J7Z6pgcWU5yLmvw=', '/jPX1RJwNWpAirraz2FbJo6iCtGJJi2Q5WObOWH4yj4oci4Mj6BIOcdeZgWtW2Kh2qXzbmhqPox2JlnZO1/+JQ==', 'zP7fPronnwucEY5Dp6OPgBbQxf8tJiPByXJ04rcWlJToRK/Y32OI2MU20Hq4rMVqVG/uL5FysKz/0xBrbRqJJA==', 'lW8eVMoJ3jWRjD7BEQaSo4kWGM+OXHFGi8PLIzxRfydciJv3rMY2KAP0Q3BrpiBG19NFZIr/UYitx0lSrGmc8w=='
                  Source: 25.3.DllHelper.exe.f110000.1.unpack, Client/Settings.csBase64 encoded string: 'yDdZmNkfICnnfuC9H5QR4RFB86NDbT3XnCucL8GcfsS2JAVnW7qRUSvi6lvtrenEU0O9gUO38K/9sI28+3KsTg==', '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', 'nS4Yc+OY1/qvAVhP34tJjSnKQWrVfQ0aImA+b5rs0NWBVvjPwnKAPJGG6ccEOr2hOni1HBRAxK/0Iwi/kuqlPNmK/VYZgIrk5NZ1T7/vonGL1qRwTTBgVOdmCCkLBdjLHSGa4rQ0+Nqh/XwSODQM5H2p4CQTZJhjbxPK8YBr5mG6Y0xDTEm7+ZaL6Fqp6saupv4mevxlwskEMtmQVLia8oQpIuMcRRly6uPox0GUHBPciJjc7LHai2zqGn5yRuUqL/2RmfXGwwK/AGJHS3/R5ZRZS87+J7Z6pgcWU5yLmvw=', '/jPX1RJwNWpAirraz2FbJo6iCtGJJi2Q5WObOWH4yj4oci4Mj6BIOcdeZgWtW2Kh2qXzbmhqPox2JlnZO1/+JQ==', 'zP7fPronnwucEY5Dp6OPgBbQxf8tJiPByXJ04rcWlJToRK/Y32OI2MU20Hq4rMVqVG/uL5FysKz/0xBrbRqJJA==', 'lW8eVMoJ3jWRjD7BEQaSo4kWGM+OXHFGi8PLIzxRfydciJv3rMY2KAP0Q3BrpiBG19NFZIr/UYitx0lSrGmc8w=='
                  Source: 30.2.InstallUtil.exe.400000.0.unpack, Client/Settings.csBase64 encoded string: 'yDdZmNkfICnnfuC9H5QR4RFB86NDbT3XnCucL8GcfsS2JAVnW7qRUSvi6lvtrenEU0O9gUO38K/9sI28+3KsTg==', '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', 'nS4Yc+OY1/qvAVhP34tJjSnKQWrVfQ0aImA+b5rs0NWBVvjPwnKAPJGG6ccEOr2hOni1HBRAxK/0Iwi/kuqlPNmK/VYZgIrk5NZ1T7/vonGL1qRwTTBgVOdmCCkLBdjLHSGa4rQ0+Nqh/XwSODQM5H2p4CQTZJhjbxPK8YBr5mG6Y0xDTEm7+ZaL6Fqp6saupv4mevxlwskEMtmQVLia8oQpIuMcRRly6uPox0GUHBPciJjc7LHai2zqGn5yRuUqL/2RmfXGwwK/AGJHS3/R5ZRZS87+J7Z6pgcWU5yLmvw=', '/jPX1RJwNWpAirraz2FbJo6iCtGJJi2Q5WObOWH4yj4oci4Mj6BIOcdeZgWtW2Kh2qXzbmhqPox2JlnZO1/+JQ==', 'zP7fPronnwucEY5Dp6OPgBbQxf8tJiPByXJ04rcWlJToRK/Y32OI2MU20Hq4rMVqVG/uL5FysKz/0xBrbRqJJA==', 'lW8eVMoJ3jWRjD7BEQaSo4kWGM+OXHFGi8PLIzxRfydciJv3rMY2KAP0Q3BrpiBG19NFZIr/UYitx0lSrGmc8w=='
                  Source: 30.0.InstallUtil.exe.400000.0.unpack, Client/Settings.csBase64 encoded string: 'yDdZmNkfICnnfuC9H5QR4RFB86NDbT3XnCucL8GcfsS2JAVnW7qRUSvi6lvtrenEU0O9gUO38K/9sI28+3KsTg==', 'SMZ0M+leTw3vnEdgjSzX00rAqF3176LLiL2UpHcQLfMK4DHffglpdrU8Ng2iao1zwVo1R3UJjfdamZY3+7/4N3O7jN4Pw42nqm2LcxtSZI1pEzEob7PqwkDc6LtqJ7cV1pceh38CYAC21LdC1VUpCpJUIkvmBozpm7NBqky2R/wC8IAs9HYcsl2zIkAryOoOH7aZymwTdO2C4rfDBzKyhMIYZx9sXYzBlDYRr2OwJMKWPXczbGSu+PGcf5ne+v+SAlSCZ60J+2XYpR0epJe9+lnHevdW13eBWtnz3ZzWQT/5LyGtSmpYhr45zkr9c0Xd7abca9AoiBaYZ4NDwLpLxnNmQCKFJRX9OdsaaxD1b+0t1b0Kbz5La9iJsxVxUEh5TStUszDyMRSqNs07VicvBLUaeXUFWJ1MeKGarIu8u5MskjoEmClboqum0bPJti+2l5rvOVT1n5SvaOBRaprtNIcSmC4tZCDlCRZqBqYMM1Jr8iw4lnhfFla74rdEZcwM0JdiVo0rbyKI2CgAOU12U8llQoHFgXyYbPy3wfGF9tVTg7SE99uvmgwGlm0S3SOX71MPNnuyLypDn49QPpuEMG3/Hssxd78O68MX3ljgz8ecZv0dgNccmUZDzv5VyGeDoxKPVFAQev7BovEBe34HXMZ41qYMnPkRQYj1qSQIUjMdNvvTzTTndfl3O5rLUI9HxOTN4MjkHRvnuTQ2VfiqNR6mGOoMnjnZzGkH75KAE8Dy13KkOlIis8ZaUXaH7njdWfXxb99HrJomL0qhsx7qWZ1mX2r8jSnfH91lb8Cd7Ao5hE7TSOJ2J7cWAc6lv9JMbN3CYplZ6vYWs1k6pWOMxfPzOmR0OWTvGZSKjbgj4DVVP6+SD2f31FVSoFdRK3VfXXTaSAepGRKesplzRXlcHdfWqQPFf8uCqIKRMgrQD+aOj54rL9VngBGXTEf6eNzto8me+yOljQ7ejwW1TaVmtpd1o0opcE1Sg4g0p969yPVJQ8lVM9SxZrYymRwEqbwndf+bbzXHG9AcgC89Z9o8dl7VGb8LfndjGYgFb1b2G5ZkOk26SZ/TOveCcVIMoWpG', 'nS4Yc+OY1/qvAVhP34tJjSnKQWrVfQ0aImA+b5rs0NWBVvjPwnKAPJGG6ccEOr2hOni1HBRAxK/0Iwi/kuqlPNmK/VYZgIrk5NZ1T7/vonGL1qRwTTBgVOdmCCkLBdjLHSGa4rQ0+Nqh/XwSODQM5H2p4CQTZJhjbxPK8YBr5mG6Y0xDTEm7+ZaL6Fqp6saupv4mevxlwskEMtmQVLia8oQpIuMcRRly6uPox0GUHBPciJjc7LHai2zqGn5yRuUqL/2RmfXGwwK/AGJHS3/R5ZRZS87+J7Z6pgcWU5yLmvw=', '/jPX1RJwNWpAirraz2FbJo6iCtGJJi2Q5WObOWH4yj4oci4Mj6BIOcdeZgWtW2Kh2qXzbmhqPox2JlnZO1/+JQ==', 'zP7fPronnwucEY5Dp6OPgBbQxf8tJiPByXJ04rcWlJToRK/Y32OI2MU20Hq4rMVqVG/uL5FysKz/0xBrbRqJJA==', 'lW8eVMoJ3jWRjD7BEQaSo4kWGM+OXHFGi8PLIzxRfydciJv3rMY2KAP0Q3BrpiBG19NFZIr/UYitx0lSrGmc8w=='
                  Source: 30.0.InstallUtil.exe.400000.1.unpack, Client/Settings.csBase64 encoded string: 'yDdZmNkfICnnfuC9H5QR4RFB86NDbT3XnCucL8GcfsS2JAVnW7qRUSvi6lvtrenEU0O9gUO38K/9sI28+3KsTg==', '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', 'nS4Yc+OY1/qvAVhP34tJjSnKQWrVfQ0aImA+b5rs0NWBVvjPwnKAPJGG6ccEOr2hOni1HBRAxK/0Iwi/kuqlPNmK/VYZgIrk5NZ1T7/vonGL1qRwTTBgVOdmCCkLBdjLHSGa4rQ0+Nqh/XwSODQM5H2p4CQTZJhjbxPK8YBr5mG6Y0xDTEm7+ZaL6Fqp6saupv4mevxlwskEMtmQVLia8oQpIuMcRRly6uPox0GUHBPciJjc7LHai2zqGn5yRuUqL/2RmfXGwwK/AGJHS3/R5ZRZS87+J7Z6pgcWU5yLmvw=', '/jPX1RJwNWpAirraz2FbJo6iCtGJJi2Q5WObOWH4yj4oci4Mj6BIOcdeZgWtW2Kh2qXzbmhqPox2JlnZO1/+JQ==', 'zP7fPronnwucEY5Dp6OPgBbQxf8tJiPByXJ04rcWlJToRK/Y32OI2MU20Hq4rMVqVG/uL5FysKz/0xBrbRqJJA==', 'lW8eVMoJ3jWRjD7BEQaSo4kWGM+OXHFGi8PLIzxRfydciJv3rMY2KAP0Q3BrpiBG19NFZIr/UYitx0lSrGmc8w=='
                  Source: 31.2.InstallUtil.exe.400000.0.unpack, Client/Settings.csBase64 encoded string: 'yDdZmNkfICnnfuC9H5QR4RFB86NDbT3XnCucL8GcfsS2JAVnW7qRUSvi6lvtrenEU0O9gUO38K/9sI28+3KsTg==', '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', 'nS4Yc+OY1/qvAVhP34tJjSnKQWrVfQ0aImA+b5rs0NWBVvjPwnKAPJGG6ccEOr2hOni1HBRAxK/0Iwi/kuqlPNmK/VYZgIrk5NZ1T7/vonGL1qRwTTBgVOdmCCkLBdjLHSGa4rQ0+Nqh/XwSODQM5H2p4CQTZJhjbxPK8YBr5mG6Y0xDTEm7+ZaL6Fqp6saupv4mevxlwskEMtmQVLia8oQpIuMcRRly6uPox0GUHBPciJjc7LHai2zqGn5yRuUqL/2RmfXGwwK/AGJHS3/R5ZRZS87+J7Z6pgcWU5yLmvw=', '/jPX1RJwNWpAirraz2FbJo6iCtGJJi2Q5WObOWH4yj4oci4Mj6BIOcdeZgWtW2Kh2qXzbmhqPox2JlnZO1/+JQ==', 'zP7fPronnwucEY5Dp6OPgBbQxf8tJiPByXJ04rcWlJToRK/Y32OI2MU20Hq4rMVqVG/uL5FysKz/0xBrbRqJJA==', 'lW8eVMoJ3jWRjD7BEQaSo4kWGM+OXHFGi8PLIzxRfydciJv3rMY2KAP0Q3BrpiBG19NFZIr/UYitx0lSrGmc8w=='
                  Source: 31.0.InstallUtil.exe.400000.0.unpack, Client/Settings.csBase64 encoded string: 'yDdZmNkfICnnfuC9H5QR4RFB86NDbT3XnCucL8GcfsS2JAVnW7qRUSvi6lvtrenEU0O9gUO38K/9sI28+3KsTg==', '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', 'nS4Yc+OY1/qvAVhP34tJjSnKQWrVfQ0aImA+b5rs0NWBVvjPwnKAPJGG6ccEOr2hOni1HBRAxK/0Iwi/kuqlPNmK/VYZgIrk5NZ1T7/vonGL1qRwTTBgVOdmCCkLBdjLHSGa4rQ0+Nqh/XwSODQM5H2p4CQTZJhjbxPK8YBr5mG6Y0xDTEm7+ZaL6Fqp6saupv4mevxlwskEMtmQVLia8oQpIuMcRRly6uPox0GUHBPciJjc7LHai2zqGn5yRuUqL/2RmfXGwwK/AGJHS3/R5ZRZS87+J7Z6pgcWU5yLmvw=', '/jPX1RJwNWpAirraz2FbJo6iCtGJJi2Q5WObOWH4yj4oci4Mj6BIOcdeZgWtW2Kh2qXzbmhqPox2JlnZO1/+JQ==', 'zP7fPronnwucEY5Dp6OPgBbQxf8tJiPByXJ04rcWlJToRK/Y32OI2MU20Hq4rMVqVG/uL5FysKz/0xBrbRqJJA==', 'lW8eVMoJ3jWRjD7BEQaSo4kWGM+OXHFGi8PLIzxRfydciJv3rMY2KAP0Q3BrpiBG19NFZIr/UYitx0lSrGmc8w=='
                  Source: 31.0.InstallUtil.exe.400000.1.unpack, Client/Settings.csBase64 encoded string: 'yDdZmNkfICnnfuC9H5QR4RFB86NDbT3XnCucL8GcfsS2JAVnW7qRUSvi6lvtrenEU0O9gUO38K/9sI28+3KsTg==', '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', 'nS4Yc+OY1/qvAVhP34tJjSnKQWrVfQ0aImA+b5rs0NWBVvjPwnKAPJGG6ccEOr2hOni1HBRAxK/0Iwi/kuqlPNmK/VYZgIrk5NZ1T7/vonGL1qRwTTBgVOdmCCkLBdjLHSGa4rQ0+Nqh/XwSODQM5H2p4CQTZJhjbxPK8YBr5mG6Y0xDTEm7+ZaL6Fqp6saupv4mevxlwskEMtmQVLia8oQpIuMcRRly6uPox0GUHBPciJjc7LHai2zqGn5yRuUqL/2RmfXGwwK/AGJHS3/R5ZRZS87+J7Z6pgcWU5yLmvw=', '/jPX1RJwNWpAirraz2FbJo6iCtGJJi2Q5WObOWH4yj4oci4Mj6BIOcdeZgWtW2Kh2qXzbmhqPox2JlnZO1/+JQ==', 'zP7fPronnwucEY5Dp6OPgBbQxf8tJiPByXJ04rcWlJToRK/Y32OI2MU20Hq4rMVqVG/uL5FysKz/0xBrbRqJJA==', 'lW8eVMoJ3jWRjD7BEQaSo4kWGM+OXHFGi8PLIzxRfydciJv3rMY2KAP0Q3BrpiBG19NFZIr/UYitx0lSrGmc8w=='
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:740:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7752:120:WilError_03
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\ads3
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:740:304:WilStaging_02
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7752:304:WilStaging_02
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00C98A10 SetThreadPriority,FindVolumeClose,GetCommConfig,LoadLibraryW,GetThreadPriority,GetCommandLineW,SetLastError,GenerateConsoleCtrlEvent,MoveFileWithProgressA,GetProcessHeaps,GetLastError,GetModuleHandleW,GetLastError,InitializeSListHead,DebugSetProcessKillOnExit,EnumSystemGeoID,GetProcessHeap,HeapFree,GetProcAddress,VirtualProtect,LoadResource,GetACP,FreeResource,SetConsoleCtrlHandler,SetConsoleCursorPosition,GetCalendarInfoW,VirtualProtect,
                  Source: C:\Users\user\AppVerif\DllHelper.exeAutomated click: OK
                  Source: C:\Users\user\AppVerif\DllHelper.exeAutomated click: OK
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic file information: File size 1870760 > 1048576
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x19f800
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: C:\pik vevaye\Wapawini\gal\Yim.pdb source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, DllHelper.exe.0.dr

                  Data Obfuscation

                  barindex
                  Source: 24.3.DllHelper.exe.db30000.0.unpack, Client/Connection/ClientSocket.cs.Net Code: Invoke System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 24.3.DllHelper.exe.db30000.1.unpack, Client/Connection/ClientSocket.cs.Net Code: Invoke System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 25.3.DllHelper.exe.f110000.1.unpack, Client/Connection/ClientSocket.cs.Net Code: Invoke System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 30.2.InstallUtil.exe.400000.0.unpack, Client/Connection/ClientSocket.cs.Net Code: Invoke System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 30.0.InstallUtil.exe.400000.0.unpack, Client/Connection/ClientSocket.cs.Net Code: Invoke System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 30.0.InstallUtil.exe.400000.1.unpack, Client/Connection/ClientSocket.cs.Net Code: Invoke System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 31.2.InstallUtil.exe.400000.0.unpack, Client/Connection/ClientSocket.cs.Net Code: Invoke System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 31.0.InstallUtil.exe.400000.0.unpack, Client/Connection/ClientSocket.cs.Net Code: Invoke System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 31.0.InstallUtil.exe.400000.1.unpack, Client/Connection/ClientSocket.cs.Net Code: Invoke System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CB70E7 push 654800CBh; retf
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CB8235 push edi; retf
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CB5D8F push esi; retf
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CB5D8C push ebx; retf
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CB5D80 push esp; retf
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CB5D84 push edi; retf
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CB5D94 push edi; retf
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CB5D6C push ebp; retf
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CB5D7B push esi; retf
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CB5D79 push edx; retf
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CB5D0C push eax; retf
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00C9962F pushfd ; ret
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E837F push edi; iretd
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E2215 push cs; iretd
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E82A5 push ebx; iretd
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E394B push ecx; iretd
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E2D74 push E9B77131h; retf
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_00FD8235 push edi; retf
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_00FB962F pushfd ; ret
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0346B37F push edi; iretd
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03465215 push cs; iretd
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0346B2A5 push ebx; iretd
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_0346694B push ecx; iretd
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_03465D74 push E9B77131h; retf
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exeStatic PE information: section name: .tenio
                  Source: DllHelper.exe.0.drStatic PE information: section name: .tenio
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CB01F0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.816031131002002
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.816031131002002
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeFile created: C:\Users\user\AppVerif\DllHelper.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior

                  Boot Survival

                  barindex
                  Source: Yara matchFile source: 24.2.DllHelper.exe.1551530.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.DllHelper.exe.ac1168.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.ac1168.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.DllHelper.exe.ac1168.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.1551530.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.ac1168.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.1551530.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.2.DllHelper.exe.1551530.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000003.2304950340.0000000000AB2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001F.00000000.2292908991.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.5733215574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001F.00000000.2292384259.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000000.2255355229.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000003.2256208402.000000000DB32000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001F.00000002.2324411113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000000.2255974959.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.2306850553.0000000000AB2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000003.2265536971.0000000001540000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000003.2293118725.000000000F112000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000002.2270243732.0000000001540000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: DllHelper.exe PID: 7412, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: DllHelper.exe PID: 7420, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 8700, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 9100, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\user\AppVerif\DllHelper.exe

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess created: C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess created: C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 24.2.DllHelper.exe.1551530.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.DllHelper.exe.ac1168.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.ac1168.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.DllHelper.exe.ac1168.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.1551530.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.ac1168.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.1551530.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.2.DllHelper.exe.1551530.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000003.2304950340.0000000000AB2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001F.00000000.2292908991.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.5733215574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001F.00000000.2292384259.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000000.2255355229.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000003.2256208402.000000000DB32000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001F.00000002.2324411113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000000.2255974959.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.2306850553.0000000000AB2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000003.2265536971.0000000001540000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000003.2293118725.000000000F112000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000002.2270243732.0000000001540000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: DllHelper.exe PID: 7412, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: DllHelper.exe PID: 7420, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 8700, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 9100, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe TID: 8944Thread sleep count: 36 > 30
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe TID: 8944Thread sleep time: -36000s >= -30000s
                  Source: C:\Users\user\AppVerif\DllHelper.exe TID: 8160Thread sleep time: -33000s >= -30000s
                  Source: C:\Users\user\AppVerif\DllHelper.exe TID: 8716Thread sleep time: -35000s >= -30000s
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 8292Thread sleep time: -30000s >= -30000s
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 9016Thread sleep time: -1844674407370954s >= -30000s
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 9008Thread sleep count: 9925 > 30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 9064Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 9925
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeAPI coverage: 8.6 %
                  Source: C:\Users\user\AppVerif\DllHelper.exeAPI coverage: 8.6 %
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess information queried: ProcessInformation
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03425906 FindFirstFileExW,
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034259BA FindFirstFileExW,FindNextFileW,FindClose,
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A8906 FindFirstFileExW,
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A89BA FindFirstFileExW,FindNextFileW,FindClose,
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppVerif\DllHelper.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppVerif\DllHelper.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile Volume queried: C:\ FullSizeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile Volume queried: C:\ FullSizeInformation
                  Source: InstallUtil.exe, 0000001E.00000002.5768662264.00000000054DC000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000003.2664763859.00000000054C6000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000003.3619122670.00000000054DC000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000003.2296530654.00000000054C1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000003.2664899186.00000000054DC000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000003.2296724230.00000000054DC000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000003.2902490903.00000000054DC000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000003.2292058067.00000000054DC000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000002.5768500815.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000003.2902379512.00000000054C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: InstallUtil.exe, 0000001E.00000002.5741664863.0000000001018000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
                  Source: SecuriteInfo.com.Variant.Jaik.84784.3654.exe, 00000000.00000002.1716284318.0000000001167000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Jaik.84784.3654.exe, 00000000.00000003.1711068931.0000000001167000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll"
                  Source: DllHelper.exe, 00000018.00000002.2270072811.0000000001524000.00000004.00000020.00020000.00000000.sdmp, DllHelper.exe, 00000019.00000002.2306611461.0000000000A89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CA0A60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CA8F12 InterlockedIncrement,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,GetFileType,WriteConsoleW,GetLastError,WriteFile,WriteFile,OutputDebugStringW,
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CB01F0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00C98A10 SetThreadPriority,FindVolumeClose,GetCommConfig,LoadLibraryW,GetThreadPriority,GetCommandLineW,SetLastError,GenerateConsoleCtrlEvent,MoveFileWithProgressA,GetProcessHeaps,GetLastError,GetModuleHandleW,GetLastError,InitializeSListHead,DebugSetProcessKillOnExit,EnumSystemGeoID,GetProcessHeap,HeapFree,GetProcAddress,VirtualProtect,LoadResource,GetACP,FreeResource,SetConsoleCtrlHandler,SetConsoleCursorPosition,GetCalendarInfoW,VirtualProtect,
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: Debug
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03424B42 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0344E390 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_034218BF mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E04C0 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_032E04C0 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A7B42 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035D1390 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A48BF mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034634C0 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_034634C0 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess queried: DebugPort
                  Source: C:\Users\user\AppVerif\DllHelper.exeProcess queried: DebugPort
                  Source: C:\Users\user\AppVerif\DllHelper.exeProcess queried: DebugPort
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: page read and write | page guard
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00C9D060 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CA0A60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CA05D0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CA5760 SetUnhandledExceptionFilter,
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03424229 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_0342115D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03420C5C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_00FBD060 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_00FC0A60 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_00FC05D0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_00FC5760 SetUnhandledExceptionFilter,
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A7229 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A415D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: 24_2_035A3C5C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppVerif\DllHelper.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000
                  Source: C:\Users\user\AppVerif\DllHelper.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: CBC008
                  Source: C:\Users\user\AppVerif\DllHelper.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000
                  Source: C:\Users\user\AppVerif\DllHelper.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: E58008
                  Source: C:\Users\user\AppVerif\DllHelper.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 protect: page read and write
                  Source: C:\Users\user\AppVerif\DllHelper.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 protect: page read and write
                  Source: C:\Users\user\AppVerif\DllHelper.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5A
                  Source: C:\Users\user\AppVerif\DllHelper.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5A
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\user\AppVerif\DllHelper.exe
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess created: C:\Users\user\AppVerif\DllHelper.exe "C:\Users\user\AppVerif\DllHelper.exe"
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe
                  Source: C:\Users\user\AppVerif\DllHelper.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  Source: C:\Users\user\AppVerif\DllHelper.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1
                  Source: InstallUtil.exe, 0000001E.00000002.5756022733.0000000003129000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000002.5750093387.0000000003007000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000003.2546144000.0000000005539000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: InstallUtil.exe, 0000001E.00000002.5756022733.0000000003129000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager`,
                  Source: InstallUtil.exe, 0000001E.00000002.5750093387.0000000003007000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000002.5749924854.0000000003001000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000002.5756758520.000000000314F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe
                  Source: InstallUtil.exe, 0000001E.00000002.5756022733.0000000003129000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000002.5750093387.0000000003007000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000002.5749924854.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: GetLocaleInfoA,
                  Source: C:\Users\user\AppVerif\DllHelper.exeCode function: GetLocaleInfoA,
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_03420E75 cpuid
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                  Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exeCode function: 0_2_00CA5780 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,

                  Lowering of HIPS / PFW / Operating System Security Settings

                  barindex
                  Source: Yara matchFile source: 24.2.DllHelper.exe.1551530.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.DllHelper.exe.ac1168.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.ac1168.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.DllHelper.exe.ac1168.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.1551530.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.ac1168.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.1551530.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.2.DllHelper.exe.1551530.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 31.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.3.DllHelper.exe.f110000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 24.3.DllHelper.exe.db30000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 30.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000003.2304950340.0000000000AB2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001F.00000000.2292908991.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.5733215574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001F.00000000.2292384259.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000000.2255355229.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000003.2256208402.000000000DB32000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001F.00000002.2324411113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000000.2255974959.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.2306850553.0000000000AB2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000003.2265536971.0000000001540000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000003.2293118725.000000000F112000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000018.00000002.2270243732.0000000001540000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: DllHelper.exe PID: 7412, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: DllHelper.exe PID: 7420, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 8700, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 9100, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                  Source: DllHelper.exe, 00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmp, DllHelper.exe, 00000018.00000003.2256208402.000000000DB32000.00000040.00000800.00020000.00000000.sdmp, DllHelper.exe, 00000018.00000003.2265536971.0000000001540000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MSASCui.exe
                  Source: DllHelper.exe, 00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmp, DllHelper.exe, 00000018.00000003.2256208402.000000000DB32000.00000040.00000800.00020000.00000000.sdmp, DllHelper.exe, 00000018.00000003.2265536971.0000000001540000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp.exe
                  Source: DllHelper.exe, 00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmp, DllHelper.exe, 00000018.00000003.2256208402.000000000DB32000.00000040.00000800.00020000.00000000.sdmp, DllHelper.exe, 00000018.00000003.2265536971.0000000001540000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0000001E.00000002.5755782102.0000000003119000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.5747812323.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 8700, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 9100, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0000001E.00000002.5755782102.0000000003119000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000001E.00000002.5747812323.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 8700, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 9100, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts1
                  Windows Management Instrumentation
                  2
                  Scheduled Task/Job
                  312
                  Process Injection
                  1
                  Masquerading
                  OS Credential Dumping1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default Accounts2
                  Scheduled Task/Job
                  1
                  DLL Side-Loading
                  2
                  Scheduled Task/Job
                  1
                  Disable or Modify Tools
                  LSASS Memory61
                  Security Software Discovery
                  Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                  Non-Standard Port
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain Accounts1
                  Native API
                  Logon Script (Windows)1
                  DLL Side-Loading
                  31
                  Virtualization/Sandbox Evasion
                  Security Account Manager2
                  Process Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)312
                  Process Injection
                  NTDS31
                  Virtualization/Sandbox Evasion
                  Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common131
                  Obfuscated Files or Information
                  Cached Domain Credentials1
                  Remote System Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items12
                  Software Packing
                  DCSync1
                  System Network Configuration Discovery
                  Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  DLL Side-Loading
                  Proc Filesystem2
                  File and Directory Discovery
                  Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                  File Deletion
                  /etc/passwd and /etc/shadow34
                  System Information Discovery
                  Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 662065 Sample: SecuriteInfo.com.Variant.Ja... Startdate: 12/07/2022 Architecture: WINDOWS Score: 62 41 Snort IDS alert for network traffic 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 5 other signatures 2->47 7 SecuriteInfo.com.Variant.Jaik.84784.3654.exe 4 2->7         started        11 DllHelper.exe 2->11         started        process3 file4 33 C:\Users\user\AppVerif\DllHelper.exe, PE32 7->33 dropped 35 C:\Users\...\DllHelper.exe:Zone.Identifier, ASCII 7->35 dropped 49 Self deletion via cmd or bat file 7->49 51 Uses schtasks.exe or at.exe to add and modify task schedules 7->51 13 DllHelper.exe 7->13         started        16 cmd.exe 1 7->16         started        18 schtasks.exe 1 7->18         started        53 Writes to foreign memory regions 11->53 55 Allocates memory in foreign processes 11->55 57 Injects a PE file into a foreign processes 11->57 20 InstallUtil.exe 3 11->20         started        signatures5 process6 signatures7 59 Antivirus detection for dropped file 13->59 61 Writes to foreign memory regions 13->61 63 Allocates memory in foreign processes 13->63 65 Injects a PE file into a foreign processes 13->65 22 InstallUtil.exe 1 2 13->22         started        67 Uses ping.exe to check the status of other devices and networks 16->67 25 PING.EXE 1 16->25         started        27 conhost.exe 16->27         started        29 chcp.com 1 16->29         started        31 conhost.exe 18->31         started        process8 dnsIp9 37 137.74.157.86, 4449, 49760 OVHFR France 22->37 39 127.0.0.1 unknown unknown 25->39

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  SecuriteInfo.com.Variant.Jaik.84784.3654.exe59%VirustotalBrowse
                  SecuriteInfo.com.Variant.Jaik.84784.3654.exe69%ReversingLabsWin32.Trojan.Jaik
                  SecuriteInfo.com.Variant.Jaik.84784.3654.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppVerif\DllHelper.exe100%AviraTR/Dropper.Gen7
                  SourceDetectionScannerLabelLinkDownload
                  24.3.DllHelper.exe.db30000.0.unpack100%AviraHEUR/AGEN.1202861Download File
                  31.2.InstallUtil.exe.400000.0.unpack100%AviraHEUR/AGEN.1202861Download File
                  25.3.DllHelper.exe.f110000.0.unpack100%AviraHEUR/AGEN.1202861Download File
                  31.0.InstallUtil.exe.400000.0.unpack100%AviraHEUR/AGEN.1202861Download File
                  24.3.DllHelper.exe.db30000.1.unpack100%AviraHEUR/AGEN.1202861Download File
                  30.2.InstallUtil.exe.400000.0.unpack100%AviraHEUR/AGEN.1202861Download File
                  25.3.DllHelper.exe.f110000.1.unpack100%AviraHEUR/AGEN.1202861Download File
                  31.0.InstallUtil.exe.400000.1.unpack100%AviraHEUR/AGEN.1202861Download File
                  30.0.InstallUtil.exe.400000.0.unpack100%AviraHEUR/AGEN.1202861Download File
                  30.0.InstallUtil.exe.400000.1.unpack100%AviraHEUR/AGEN.1202861Download File
                  No Antivirus matches
                  No Antivirus matches
                  No contacted domains info
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameInstallUtil.exe, 0000001E.00000002.5754333031.00000000030D0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000001E.00000002.5747812323.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    137.74.157.86
                    unknownFrance
                    16276OVHFRtrue
                    IP
                    127.0.0.1
                    Joe Sandbox Version:35.0.0 Citrine
                    Analysis ID:662065
                    Start date and time: 12/07/202217:52:392022-07-12 17:52:39 +02:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 19m 52s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:SecuriteInfo.com.Variant.Jaik.84784.3654.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                    Run name:Suspected Instruction Hammering
                    Number of analysed new started processes analysed:39
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal62.troj.evad.winEXE@18/4@0/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 28.6% (good quality ratio 27.1%)
                    • Quality average: 74%
                    • Quality standard deviation: 29.1%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Adjust boot time
                    • Enable AMSI
                    • Exclude process from analysis (whitelisted): taskhostw.exe, MusNotification.exe, dllhost.exe, RuntimeBroker.exe, SIHClient.exe, backgroundTaskHost.exe, MoUsoCoreWorker.exe, UsoClient.exe, BackgroundTransferHost.exe, WMIADAP.exe, SgrmBroker.exe, svchost.exe
                    • TCP Packets have been reduced to 100
                    • Excluded IPs from analysis (whitelisted): 20.82.19.171, 93.184.221.240, 209.197.3.8
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, wu.ec.azureedge.net, settings-win.data.microsoft.com, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wdcp.microsoft.com, arc.msn.com, wd-prod-cp.trafficmanager.net, wu-bg-shim.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, ris.api.iris.microsoft.com, wdcpalt.microsoft.com, login.live.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, wd-prod-cp-eu-west-2-fe.westeurope.cloudapp.azure.com, img-prod-cms-rt-microsoft-com.akamaized.net, nexusrules.officeapps.live.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report creation exceeded maximum time and may have missing disassembly code information.
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    17:57:39Task SchedulerRun new task: COMSurrogate path: C:\Users\user\AppVerif\DllHelper.exe
                    17:58:44API Interceptor1x Sleep call for process: InstallUtil.exe modified
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    File Type:data
                    Category:modified
                    Size (bytes):326
                    Entropy (8bit):3.402941568099142
                    Encrypted:false
                    SSDEEP:6:kKdSQ8Yb+N+SkQlPlEGYRMY9z+4KlDA3RUeWlEZ21:gQPNkPlE99SNxAhUeE1
                    MD5:C2DBA9ABC6BF0908291C545046D98A63
                    SHA1:F5EF21F117B4F19470C243DF5747753B44905B32
                    SHA-256:E604D978C3CA33ECFCF47FE2BD012842B71CA3F5E7A21B886F03171DF4DB15F1
                    SHA-512:E6CF8576FEB74856F23C6767B4E4CA429C8EE6C0F20775C4C3C4A869710F77182B7BCEAEBF241404FD0E5D4D2EBEE1EDCD98345EDE1786C277ACACC0FD92A5CE
                    Malicious:false
                    Preview:p...... ................(.................................................QF.... .........L.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.9.f.4.c.9.6.9.8.b.d.8.1.:.0."...
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):425
                    Entropy (8bit):5.35152097590267
                    Encrypted:false
                    SSDEEP:12:Q3La/KDLI4MWuPuuOKbbDLI4MWuPJKy2Khav:ML9E4KGbKDE4KhKzKhk
                    MD5:8C7889BDE41724CE3DB7C67E730677F6
                    SHA1:485891CC9120CB2203A2483754DBD5E6EA24F28E
                    SHA-256:83C70BFCB1B41892C9C50CABE9BC2D96B2F7420B28545AFABD32F682AC62D0AD
                    SHA-512:B7C3AAB27FC924DCAEF78987B492931E164B9E30B813C532FE87E1D40001ED1861C4B5DDBDD85CD2278681A22E32EEE816877F4F63CECAA9972976D87E38F5CC
                    Malicious:false
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\68e52ded8d0e73920808d8880ed14efd\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\62fe5fc1b5bafb28a19a2754318abf00\System.Core.ni.dll",0..
                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:modified
                    Size (bytes):831294376
                    Entropy (8bit):0.039372401793613315
                    Encrypted:false
                    SSDEEP:
                    MD5:BFEF1ABAB0ACACB7DC9D8828B32CFDE4
                    SHA1:77E8DB7D353194E119A2988D851E98069BD44CAD
                    SHA-256:CAE28D2DB2FC7CDFD80CA57DB3A9704AED9685421F194C52A2BEF94D7510A843
                    SHA-512:73ABDE477518AC06DCA49303A7B93A5477BBB30BD8056262A15831D748082F4CAFD7163B8D98D3CB4120ACBC178A7557F67B3E4F48F6B4C76B3EA4209AA4B918
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,...h..h..h..v...y..v...T..v......O..k..h.....v...j..v...i..h...i..v...i..Richh..........................PE..L...,.(]..........................................@......................................@.................................l...(....`...............x..................................................@............................................text...`........................... ..`.data...h1..........................@....tenio.......P......................@....rsrc........`......................@..@.reloc..rG.......H...0..............@..B................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Preview:[ZoneTransfer]....ZoneId=0
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.789455480828862
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.53%
                    • InstallShield setup (43055/19) 0.43%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:SecuriteInfo.com.Variant.Jaik.84784.3654.exe
                    File size:1870760
                    MD5:74cd3c3d32dcf5029d1bc66347f44af7
                    SHA1:d7ec9719a6e5ea0b386ef590b1b74c317e597ff8
                    SHA256:cb943da125fde19e41c965a9f260caf79a6fca98c89b83bde609b843be0da377
                    SHA512:6b1340641f1f7820755ccc9e78b083ab32444d560274103e21a3ccaf4dee93b62340a6445960dc5a8f09a0de87c138e182a2c1012fdaf4f4d6d39e88922451fe
                    SSDEEP:49152:yCu54sLM0OEl6bINMreuk8i09pEkJz5lAcs5PVS7fhl:yCu5OGpQefZ0vfTsfSj
                    TLSH:9D851208EA509426F4F7863451F98AADA63C94D71F4845C387E4A3FA866C3D0FE3257B
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,...h...h...h...v...y...v...T...v.......O...k...h.......v...j...v...i...h...i...v...i...Richh...........................PE..L..
                    Icon Hash:e0ccbcccc2f2e4cc
                    Entrypoint:0x40cdb0
                    Entrypoint Section:.text
                    Digitally signed:true
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x5D280B2C [Fri Jul 12 04:23:08 2019 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:0
                    File Version Major:5
                    File Version Minor:0
                    Subsystem Version Major:5
                    Subsystem Version Minor:0
                    Import Hash:7f1ef45f5deb563bbecd8473c31a66d3
                    Signature Valid:false
                    Signature Issuer:CN=R3, O=Let's Encrypt, C=US
                    Signature Validation Error:A certificate chain could not be built to a trusted root authority
                    Error Number:-2146762486
                    Not Before, Not After
                    • 23/05/2022 10:32:40 21/08/2022 10:32:39
                    Subject Chain
                    • CN=www.artweaver.de
                    Version:3
                    Thumbprint MD5:BC879E2879685CBEB888E5D32DD8189D
                    Thumbprint SHA-1:01B29404E8E3D0019404677B8E9699DF9750B294
                    Thumbprint SHA-256:0FA3497022A3B9B10A0B786533C315048B785CDFE262198828BDCAB722017FC9
                    Serial:03BB38E009072B417BF8459D28B7B3D18D33
                    Instruction
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    call 00007F1F90B3D85Bh
                    call 00007F1F90B34EA6h
                    pop ebp
                    ret
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    push FFFFFFFEh
                    push 0059F440h
                    push 004112B0h
                    mov eax, dword ptr fs:[00000000h]
                    push eax
                    add esp, FFFFFF94h
                    push ebx
                    push esi
                    push edi
                    mov eax, dword ptr [005A1338h]
                    xor dword ptr [ebp-08h], eax
                    xor eax, ebp
                    push eax
                    lea eax, dword ptr [ebp-10h]
                    mov dword ptr fs:[00000000h], eax
                    mov dword ptr [ebp-18h], esp
                    mov dword ptr [ebp-70h], 00000000h
                    mov dword ptr [ebp-04h], 00000000h
                    lea eax, dword ptr [ebp-60h]
                    push eax
                    call dword ptr [004010C4h]
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    jmp 00007F1F90B34EB8h
                    mov eax, 00000001h
                    ret
                    mov esp, dword ptr [ebp-18h]
                    mov dword ptr [ebp-78h], 000000FFh
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    mov eax, dword ptr [ebp-78h]
                    jmp 00007F1F90B34FE7h
                    mov dword ptr [ebp-04h], FFFFFFFEh
                    call 00007F1F90B35024h
                    mov dword ptr [ebp-6Ch], eax
                    push 00000001h
                    call 00007F1F90B3ED9Ah
                    add esp, 04h
                    test eax, eax
                    jne 00007F1F90B34E9Ch
                    push 0000001Ch
                    call 00007F1F90B34FDCh
                    add esp, 04h
                    call 00007F1F90B3CAE4h
                    test eax, eax
                    jne 00007F1F90B34E9Ch
                    push 00000010h
                    Programming Language:
                    • [ASM] VS2008 build 21022
                    • [C++] VS2008 build 21022
                    • [ C ] VS2008 build 21022
                    • [IMP] VS2005 build 50727
                    • [RES] VS2008 build 21022
                    • [LNK] VS2008 build 21022
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x19fc6c0x28.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a60000x21cc8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x1c78000x13a8
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1c80000x19c0.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x12000x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x82a80x40.text
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x10000x1bc.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x19f6600x19f800False0.8492162821525271data7.816031131002002IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .data0x1a10000x31680x1400False0.3314453125data3.4095039121071826IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .tenio0x1a50000x40x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x1a60000x21cc80x21e00False0.8149792435424354data7.4602970996808775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x1c80000x47720x4800False0.3001844618055556data3.257312610228726IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x1a63600x1608ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                    RT_ICON0x1bc3f00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                    RT_ICON0x1c06180x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 16777216, next used block 0
                    RT_ICON0x1c2bc00xea8data
                    RT_ICON0x1c3a680x668data
                    RT_ICON0x1c40d00x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                    RT_ICON0x1c51780x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 12707524, next used block 13232843
                    RT_ICON0x1c5a200x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 2866470365, next used block 64682
                    RT_ICON0x1c5d080x988data
                    RT_ICON0x1c66900x6c8data
                    RT_ICON0x1c6d580x1e8data
                    RT_ICON0x1c6f400x468GLS_BINARY_LSB_FIRST
                    RT_ICON0x1c73a80x568GLS_BINARY_LSB_FIRST
                    RT_ICON0x1c79100x128GLS_BINARY_LSB_FIRST
                    RT_GROUP_ICON0x1c7a380xcadata
                    RT_VERSION0x1c7b080x1bcdata
                    DLLImport
                    KERNEL32.dllExitProcess, GetCommandLineW, SearchPathW, FindVolumeClose, CreateFiber, FreeResource, CreateFileTransactedW, LoadResource, InitializeSListHead, HeapFree, MoveFileWithProgressA, GetModuleHandleW, GetCommConfig, GenerateConsoleCtrlEvent, GetProcessHeap, ClearCommBreak, SetCommTimeouts, LoadLibraryW, SwitchToFiber, GetCalendarInfoW, SetConsoleCursorPosition, GetACP, SetThreadPriority, VerifyVersionInfoW, DeleteFiber, GetLastError, SetLastError, GetProcAddress, GetProcessHeaps, SetConsoleCtrlHandler, SetFileApisToANSI, FoldStringA, GetThreadPriority, DebugSetProcessKillOnExit, WaitCommEvent, EnumSystemGeoID, CloseHandle, MoveFileTransactedW, FindActCtxSectionStringW, ResetWriteWatch, CreateThread, InterlockedIncrement, InterlockedDecrement, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetFullPathNameA, GetStartupInfoW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameW, HeapValidate, IsBadReadPtr, RaiseException, RtlUnwind, TerminateProcess, GetCurrentProcess, IsDebuggerPresent, GetDriveTypeA, GetOEMCP, GetCPInfo, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, GetCurrentThreadId, TlsFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, HeapDestroy, HeapCreate, VirtualFree, GetModuleFileNameA, WriteFile, FlushFileBuffers, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, DebugBreak, OutputDebugStringA, WriteConsoleW, OutputDebugStringW, HeapAlloc, HeapSize, HeapReAlloc, VirtualAlloc, InitializeCriticalSectionAndSpinCount, GetCurrentDirectoryA, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, LoadLibraryA, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, SetFilePointer, CreateFileA
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    137.74.157.86192.168.11.204449497602848152 07/12/22-17:58:43.541738TCP2848152ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT Variant)444949760137.74.157.86192.168.11.20
                    137.74.157.86192.168.11.204449497602850454 07/12/22-17:58:43.541738TCP2850454ETPRO TROJAN Observed Malicious SSL Cert (AsyncRAT)444949760137.74.157.86192.168.11.20
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 12, 2022 17:58:43.468368053 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:58:43.487335920 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:58:43.487631083 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:58:43.520340919 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:58:43.541738033 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:58:43.547988892 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:58:43.569195032 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:58:43.612924099 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:58:45.455966949 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:58:45.519243002 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:58:45.519464016 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:58:45.581790924 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:58:57.445862055 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:58:57.519129038 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:58:57.519452095 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:58:57.540577888 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:58:57.594261885 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:58:57.613362074 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:58:57.656783104 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:58:57.795804024 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:58:57.863199949 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:58:57.863424063 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:58:57.925687075 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:09.396325111 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:09.457000017 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:09.457176924 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:09.477658033 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:09.529151917 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:09.548430920 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:09.591762066 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:09.667908907 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:09.738001108 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:09.738202095 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:09.800726891 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:15.210663080 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:15.262234926 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:15.281449080 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:15.324704885 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:21.586010933 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:21.659635067 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:21.659771919 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:21.680174112 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:21.729585886 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:21.748480082 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:21.792139053 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:21.797532082 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:21.863042116 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:21.863226891 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:21.925453901 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:33.302330971 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:33.362873077 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:33.363187075 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:33.389679909 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:33.430144072 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:33.449682951 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:33.492542982 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:33.498559952 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:33.581856966 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:33.582079887 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:33.644290924 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:45.210776091 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:45.255635023 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:45.274761915 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:45.318262100 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:45.400360107 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:45.472410917 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:45.472580910 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:45.492846966 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:45.536858082 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:45.556005001 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:45.599385977 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:45.619894028 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:45.691129923 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:45.691438913 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:45.753420115 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:57.191132069 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:57.253688097 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:57.254262924 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:57.275015116 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:57.315433979 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:57.334304094 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:57.377983093 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:57.380475998 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:57.441272020 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 17:59:57.441450119 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 17:59:57.503982067 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 18:00:09.147196054 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 18:00:09.206793070 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 18:00:09.207063913 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 18:00:09.228027105 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 18:00:09.281673908 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 18:00:09.301120043 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 18:00:09.344209909 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 18:00:09.346262932 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 18:00:09.409477949 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 18:00:09.409713984 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 18:00:09.472460032 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 18:00:15.211327076 CEST444949760137.74.157.86192.168.11.20
                    Jul 12, 2022 18:00:15.264772892 CEST497604449192.168.11.20137.74.157.86
                    Jul 12, 2022 18:00:15.284172058 CEST444949760137.74.157.86192.168.11.20

                    Click to jump to process

                    Target ID:0
                    Start time:17:56:03
                    Start date:12/07/2022
                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe"
                    Imagebase:0xc90000
                    File size:1870760 bytes
                    MD5 hash:74CD3C3D32DCF5029D1BC66347F44AF7
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low

                    Target ID:22
                    Start time:17:57:36
                    Start date:12/07/2022
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\user\AppVerif\DllHelper.exe
                    Imagebase:0x120000
                    File size:187904 bytes
                    MD5 hash:478BEAEC1C3A9417272BC8964ADD1CEE
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate

                    Target ID:23
                    Start time:17:57:37
                    Start date:12/07/2022
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7ee140000
                    File size:875008 bytes
                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:24
                    Start time:17:57:44
                    Start date:12/07/2022
                    Path:C:\Users\user\AppVerif\DllHelper.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppVerif\DllHelper.exe"
                    Imagebase:0xfb0000
                    File size:831294376 bytes
                    MD5 hash:BFEF1ABAB0ACACB7DC9D8828B32CFDE4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice, Description: Detects executables attemping to enumerate video devices using WMI, Source: 00000018.00000003.2241216338.000000000DB30000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000018.00000003.2256208402.000000000DB32000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000018.00000003.2265536971.0000000001540000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000018.00000002.2270243732.0000000001540000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    Antivirus matches:
                    • Detection: 100%, Avira
                    Reputation:low

                    Target ID:25
                    Start time:17:57:45
                    Start date:12/07/2022
                    Path:C:\Users\user\AppVerif\DllHelper.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppVerif\DllHelper.exe
                    Imagebase:0xfb0000
                    File size:831294376 bytes
                    MD5 hash:BFEF1ABAB0ACACB7DC9D8828B32CFDE4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice, Description: Detects executables attemping to enumerate video devices using WMI, Source: 00000019.00000003.2279210253.000000000F110000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000019.00000003.2304950340.0000000000AB2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000019.00000002.2306850553.0000000000AB2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000019.00000003.2293118725.000000000F112000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low

                    Target ID:26
                    Start time:17:57:46
                    Start date:12/07/2022
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Jaik.84784.3654.exe
                    Imagebase:0x9b0000
                    File size:236544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate

                    Target ID:27
                    Start time:17:57:46
                    Start date:12/07/2022
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7ee140000
                    File size:875008 bytes
                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:28
                    Start time:17:57:46
                    Start date:12/07/2022
                    Path:C:\Windows\SysWOW64\chcp.com
                    Wow64 process (32bit):true
                    Commandline:chcp 65001
                    Imagebase:0x790000
                    File size:12800 bytes
                    MD5 hash:41146159AA3D41A92B53ED311EE15693
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate

                    Target ID:29
                    Start time:17:57:46
                    Start date:12/07/2022
                    Path:C:\Windows\SysWOW64\PING.EXE
                    Wow64 process (32bit):true
                    Commandline:ping 127.0.0.1
                    Imagebase:0xe80000
                    File size:18944 bytes
                    MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low

                    Target ID:30
                    Start time:17:58:40
                    Start date:12/07/2022
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    Imagebase:0xa80000
                    File size:42064 bytes
                    MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000001E.00000002.5733215574.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000001E.00000000.2255355229.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000001E.00000000.2255974959.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 0000001E.00000002.5755782102.0000000003119000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_DcRat_2, Description: Yara detected DcRat, Source: 0000001E.00000002.5747812323.0000000002FA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security

                    Target ID:31
                    Start time:17:58:44
                    Start date:12/07/2022
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                    Imagebase:0x7ff6733e0000
                    File size:42064 bytes
                    MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000001F.00000000.2292908991.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000001F.00000000.2292384259.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000001F.00000002.2324411113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security

                    No disassembly