Querying for the presence of debuggers or system analysis tools to evade detection.
Modifying system registry keys, including proxy and internet zone settings. Azer 2018-09-22.rar
: Automated sandboxes have noted that executables originating from similar samples may perform suspicious actions, such as: Querying for the presence of debuggers or system
If you have encountered this file on your system, it is highly recommended to perform a full system scan using a reputable security suite like those discussed on community forums such as BleepingComputer . Free Automated Malware Analysis Service - Hybrid Analysis Azer 2018-09-22.rar