Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.17259

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.17259 (renamed file extension from 17259 to exe)
Analysis ID:356592
MD5:2915c0afb0b6b26a5a699965d2119f7a
SHA1:32fdcc2e0bcfc476347078d7ea05f12d5a259bea
SHA256:38b6a40d2eeddf38695294c57971fc2efab81fea95100260a2003baa13616b83

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected FormBook
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Maps a DLL or memory area into another process
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.856380692.xyz/nsag/"], "decoy": ["usopencoverage.com", "5bo5j.com", "deliveryourvote.com", "bestbuycarpethd.com", "worldsourcecloud.com", "glowtheblog.com", "translations.tools", "ithacapella.com", "machinerysubway.com", "aashlokhospitals.com", "athara-kiano.com", "anabittencourt.com", "hakimkhawatmi.com", "fashionwatchesstore.com", "krishnagiri.info", "tencenttexts.com", "kodairo.com", "ouitum.club", "robertbeauford.net", "polling.asia", "evoslancete.com", "4676sabalkey.com", "chechadskeitaro.com", "babyhopeful.com", "11376.xyz", "oryanomer.com", "jyxxfy.com", "scanourworld.com", "thevistadrinksco.com", "meow-cafe.com", "xfixpros.com", "botaniquecouture.com", "bkhlep.xyz", "mauriciozarate.com", "icepolo.com", "siyezim.com", "myfeezinc.com", "nooshone.com", "wholesalerbargains.com", "winabeel.com", "frankfrango.com", "patientsbooking.info", "ineedahealer.com", "thefamilyorchard.net", "clericallyco.com", "overseaexpert.com", "bukaino.net", "womens-secrets.love", "skinjunkie.site", "dccheavydutydiv.net", "explorerthecity.com", "droneserviceshouston.com", "creationsbyjamie.com", "profirma-nachfolge.com", "oasisbracelet.com", "maurobenetti.com", "mecs.club", "mistressofherdivinity.com", "vooronsland.com", "navia.world", "commagx4.info", "caresring.com", "yourstrivingforexcellence.com", "alpinevalleytimeshares.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8982:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x14695:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x14181:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x14797:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1490f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x939a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x133fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa112:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19787:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1a82a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x166b9:$sqlite3step: 68 34 1C 7B E1
    • 0x167cc:$sqlite3step: 68 34 1C 7B E1
    • 0x166e8:$sqlite3text: 68 38 2A 90 C5
    • 0x1680d:$sqlite3text: 68 38 2A 90 C5
    • 0x166fb:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16823:$sqlite3blob: 68 53 D8 7F 8C
    00000003.00000002.211005470.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000003.00000002.211005470.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8982:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x14695:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x14181:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x14797:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1490f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x939a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x133fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa112:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x19787:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1a82a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 4 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8982:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x14695:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x14181:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x14797:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1490f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x939a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x133fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa112:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x19787:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1a82a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x166b9:$sqlite3step: 68 34 1C 7B E1
        • 0x167cc:$sqlite3step: 68 34 1C 7B E1
        • 0x166e8:$sqlite3text: 68 38 2A 90 C5
        • 0x1680d:$sqlite3text: 68 38 2A 90 C5
        • 0x166fb:$sqlite3blob: 68 53 D8 7F 8C
        • 0x16823:$sqlite3blob: 68 53 D8 7F 8C
        3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x77e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x7b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x13895:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x13381:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x13997:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x13b0f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x859a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x125fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x9312:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x18987:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x19a2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 13 entries

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.raw.unpackMalware Configuration Extractor: FormBook {"C2 list": ["www.856380692.xyz/nsag/"], "decoy": ["usopencoverage.com", "5bo5j.com", "deliveryourvote.com", "bestbuycarpethd.com", "worldsourcecloud.com", "glowtheblog.com", "translations.tools", "ithacapella.com", "machinerysubway.com", "aashlokhospitals.com", "athara-kiano.com", "anabittencourt.com", "hakimkhawatmi.com", "fashionwatchesstore.com", "krishnagiri.info", "tencenttexts.com", "kodairo.com", "ouitum.club", "robertbeauford.net", "polling.asia", "evoslancete.com", "4676sabalkey.com", "chechadskeitaro.com", "babyhopeful.com", "11376.xyz", "oryanomer.com", "jyxxfy.com", "scanourworld.com", "thevistadrinksco.com", "meow-cafe.com", "xfixpros.com", "botaniquecouture.com", "bkhlep.xyz", "mauriciozarate.com", "icepolo.com", "siyezim.com", "myfeezinc.com", "nooshone.com", "wholesalerbargains.com", "winabeel.com", "frankfrango.com", "patientsbooking.info", "ineedahealer.com", "thefamilyorchard.net", "clericallyco.com", "overseaexpert.com", "bukaino.net", "womens-secrets.love", "skinjunkie.site", "dccheavydutydiv.net", "explorerthecity.com", "droneserviceshouston.com", "creationsbyjamie.com", "profirma-nachfolge.com", "oasisbracelet.com", "maurobenetti.com", "mecs.club", "mistressofherdivinity.com", "vooronsland.com", "navia.world", "commagx4.info", "caresring.com", "yourstrivingforexcellence.com", "alpinevalleytimeshares.com"]}
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Local\Temp\z9ayiyo.dllReversingLabs: Detection: 19%
          Multi AV Scanner detection for submitted fileShow sources
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeVirustotal: Detection: 38%Perma Link
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeReversingLabs: Detection: 31%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.211005470.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.211020267.0000000002A50000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Machine Learning detection for sampleShow sources
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeJoe Sandbox ML: detected
          Source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen

          Compliance:

          barindex
          Uses 32bit PE filesShow sources
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Binary contains paths to debug symbolsShow sources
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe, 00000001.00000003.206415100.0000000002C40000.00000004.00000001.sdmp, SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe, 00000003.00000002.213181158.0000000000B1F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_00405A15 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_004065C1 FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_004027A1 FindFirstFileA,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 4x nop then pop esi
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 4x nop then pop ebx
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 4x nop then pop edi

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.856380692.xyz/nsag/
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_004054B2 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.211005470.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.211020267.0000000002A50000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.211005470.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.211005470.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.211020267.0000000002A50000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.211020267.0000000002A50000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_004181C0 NtCreateFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00418270 NtReadFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_004182F0 NtClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_004183A0 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041817A NtCreateFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_004181BA NtCreateFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041826A NtReadFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A696E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A698A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A698F0 NtReadVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69840 NtDelayExecution,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A6B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A699A0 NtCreateSection,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A699D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69910 NtAdjustPrivilegesToken,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69A20 NtResumeThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69A00 NtProtectVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69A10 NtQuerySection,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69A50 NtCreateFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A6A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A695F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A695D0 NtClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A6AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69560 NtWriteFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69540 NtReadFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A696D0 NtCreateKey,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69670 NtQueryInformationProcess,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A697A0 NtUnmapViewOfSection,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69780 NtMapViewOfSection,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69FE0 NtCreateMutant,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69710 NtQueryInformationToken,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A6A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69760 NtOpenProcess,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A6A770 NtOpenThread,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_00403486 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_00407272
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_00406A9B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_740D1A98
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041B808
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00401030
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041A2AA
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041BBA8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00408C60
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041BD28
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00402D8E
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00402D90
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041C785
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00402FB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A520A0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF20A8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3B090
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF28EC
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AFE824
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A830
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A26800
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1002
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A499BF
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A42990
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A44120
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2F900
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF22AE
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF32A9
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEE2C5
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ADFA2B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B236
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5EBB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ACEB8A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5138B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4EB9A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AD23E3
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A78BE8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE03DA
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEDBD2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5ABD8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF2B28
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE231B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A43360
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ACCB4F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4AB40
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A42430
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3841F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AED466
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B477
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A565A0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A52581
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE2D82
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3D5E0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF25DD
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A20D20
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF2D07
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A42D50
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF1D55
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AD1EB6
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF2EF7
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A46E30
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A45600
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AED616
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AAAE60
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE67E2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF1FF1
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AFDFCE
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\z9ayiyo.dll 2D78C0015CEC67CD072ACFB337075825D4A6866D5FAC1B497A649DEB2190F42C
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: String function: 00AB5720 appears 78 times
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: String function: 00A2B150 appears 154 times
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: String function: 00A7D08C appears 43 times
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe, 00000001.00000003.208193425.0000000002BC6000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe, 00000001.00000002.210366962.00000000021A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameuser32j% vs SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe, 00000003.00000002.213181158.0000000000B1F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: 00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.211005470.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.211005470.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.211020267.0000000002A50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.211020267.0000000002A50000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: classification engineClassification label: mal100.troj.evad.winEXE@3/4@0/0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_00403486 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_00404763 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_73784225 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_0040216B CoCreateInstance,MultiByteToWideChar,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeFile created: C:\Users\user\AppData\Local\Temp\nsaBD30.tmpJump to behavior
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeVirustotal: Detection: 38%
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeReversingLabs: Detection: 31%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe'
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe'
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe'
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
          Source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe, 00000001.00000003.206415100.0000000002C40000.00000004.00000001.sdmp, SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe, 00000003.00000002.213181158.0000000000B1F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe

          Data Obfuscation:

          barindex
          Detected unpacking (changes PE section rights)Show sources
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeUnpacked PE file: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .text:ER;
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_740D1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
          Source: z9ayiyo.dll.1.drStatic PE information: section name: .code
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_740D2F60 push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_004160D8 push ebp; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041C96C push cs; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041B3B5 push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041B46C push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041B402 push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041B40B push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041C40D push esi; iretd
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041C485 push FFFFFFC3h; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00415CA3 push edx; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_0041CFC1 pushfd ; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_004187D8 push ss; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A7D0D1 push ecx; ret
          Source: initial sampleStatic PE information: section name: .data entropy: 7.7471273442
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeFile created: C:\Users\user\AppData\Local\Temp\nsaBD32.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeFile created: C:\Users\user\AppData\Local\Temp\z9ayiyo.dllJump to dropped file
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeRDTSC instruction interceptor: First address: 00000000004085E4 second address: 00000000004085EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeRDTSC instruction interceptor: First address: 000000000040897E second address: 0000000000408984 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_004088B0 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_00405A15 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_004065C1 FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_004027A1 FindFirstFileA,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_004088B0 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A69860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_740D1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_7378458C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_7378478F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A690AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A328AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A328AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A328AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A328AE mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A328AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A328AE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A29080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A23880 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A23880 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B8E4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A240E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A240E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A240E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A258EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A328FD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A328FD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A328FD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A270C0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A270C0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE18CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ABB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ABB8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ABB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ABB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ABB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ABB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A54020 mov edi, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A830 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A26800 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A26800 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A26800 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4F86D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1843 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A25050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A25050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A25050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A40050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A40050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A27057 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A361A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A361A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A361A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A361A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A561A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A561A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE49A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5C9BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5C9BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AFF1B5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AFF1B5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A499BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A499BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A499BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A499BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A499BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEA189 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEA189 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A52990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A54190 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2519E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2519E mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A231E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AB41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF89E7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A399C7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A399C7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A399C7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A399C7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE19D8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A44120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A44120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A44120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A44120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A44120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A23138 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A29100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A29100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A29100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A30100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A30100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A30100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF8966 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEE962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2395E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2395E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1951 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A21AA0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A55AA0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A55AA0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A512BD mov esi, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A512BD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A512BD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5DA88 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5DA88 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE129A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A52AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4AEF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A25AC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A25AC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A25AC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A23ACA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A52ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF8ADD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A212D4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A24A20 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A24A20 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A64A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A64A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A229 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B236 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A28239 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A28239 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A28239 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A38A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A25210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A25210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A25210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A25210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A43A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ADB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ADB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A65A69 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A65A69 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A65A69 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A6927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A29240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A29240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A29240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A29240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1A5F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AB4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1BA8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A54BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A54BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A54BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF9BBE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF8BB6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ACEB8A mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ACEB8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ACEB8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ACEB8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A31B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A31B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ADD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5138B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A52397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A24B94 mov edi, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4EB9A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4EB9A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A21BE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AD23E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AD23E3 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AD23E3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A553C5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4A309 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AB6365 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AB6365 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AB6365 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3F370 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3F370 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3F370 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A53B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A53B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A53B5A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A53B5A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A53B5A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A53B5A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A24CB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5D4B0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF9CB3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A21480 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE4496 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2649B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2649B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5CCC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5CCC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5CCC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5CCC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A22CDB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3B433 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3B433 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3B433 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A42430 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A42430 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A53C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A53C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A53C3E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A24439 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF8C14 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4B477 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A65C70 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF8C75 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5AC7B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ABC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ABC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF8450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A535A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A565A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A565A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A565A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A51DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A51DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A51DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A52581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A52581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A52581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A52581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A22D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A22D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A22D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A22D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A22D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE2D82 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEB581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEB581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEB581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEB581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A23591 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A3D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A595EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A295F0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A295F0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AD8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA6DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A215C1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00ADFDD3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5F527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5F527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A5F527 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AEE539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AAA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A54D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A54D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A54D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE3518 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE3518 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE3518 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A48D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A48D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A48D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A48D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A48D76 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A4C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A63D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AD8D47 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AD3D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2354C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A2354C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A47D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A64D51 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00A64D51 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AB2EA3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AF0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AA46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 3_2_00AE56B6 mov eax, dword ptr fs:[00000030h]

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeSection loaded: unknown target: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe'
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exeCode function: 1_2_00403486 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.211005470.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.211020267.0000000002A50000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.211005470.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.211020267.0000000002A50000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.raw.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsNative API1Path InterceptionAccess Token Manipulation1Virtualization/Sandbox Evasion2OS Credential DumpingSecurity Software Discovery23Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection111Access Token Manipulation1LSASS MemoryVirtualization/Sandbox Evasion2Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection111Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSFile and Directory Discovery2Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information4LSA SecretsSystem Information Discovery13SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing12Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe39%VirustotalBrowse
          SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe31%ReversingLabsWin32.Trojan.Generic
          SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe100%Joe Sandbox ML

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\nsaBD32.tmp\System.dll0%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsaBD32.tmp\System.dll0%MetadefenderBrowse
          C:\Users\user\AppData\Local\Temp\nsaBD32.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\z9ayiyo.dll19%ReversingLabsWin32.Trojan.Convagent

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          1.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.2a50000.5.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          3.2.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          3.1.SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          www.856380692.xyz/nsag/0%VirustotalBrowse
          www.856380692.xyz/nsag/0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          No contacted domains info

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          www.856380692.xyz/nsag/true
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          low

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://nsis.sf.net/NSIS_ErrorSecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exefalse
            high
            http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exefalse
              high

              Contacted IPs

              No contacted IP infos

              General Information

              Joe Sandbox Version:31.0.0 Emerald
              Analysis ID:356592
              Start date:23.02.2021
              Start time:11:50:46
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 4m 49s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.17259 (renamed file extension from 17259 to exe)
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:6
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@3/4@0/0
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 26.5% (good quality ratio 24.8%)
              • Quality average: 72.9%
              • Quality standard deviation: 30.9%
              HCA Information:
              • Successful, ratio: 62%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Stop behavior analysis, all processes terminated
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe

              Simulations

              Behavior and APIs

              No simulations

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              No context

              ASN

              No context

              JA3 Fingerprints

              No context

              Dropped Files

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              C:\Users\user\AppData\Local\Temp\nsaBD32.tmp\System.dllQTN3C2AF414EDF9_041873.xlsxGet hashmaliciousBrowse
                TIC ENQ2040 FCl.xlsxGet hashmaliciousBrowse
                  lpdKSOB78u.exeGet hashmaliciousBrowse
                    jTmBvrBw7V.exeGet hashmaliciousBrowse
                      523JHfbGM1.exeGet hashmaliciousBrowse
                        TAk8jeG5ob.exeGet hashmaliciousBrowse
                          PAYMENT COPY.exeGet hashmaliciousBrowse
                            ORDER LIST.xlsxGet hashmaliciousBrowse
                              Orderoffer.exeGet hashmaliciousBrowse
                                Our New Order Feb 23 2021 at 2.30_PVV440_PDF.exeGet hashmaliciousBrowse
                                  INV_PR2201.docmGet hashmaliciousBrowse
                                    CV-JOB REQUEST______PDF.EXEGet hashmaliciousBrowse
                                      Request for Quotation.exeGet hashmaliciousBrowse
                                        #U007einvoice#U007eSC00978656.xlsxGet hashmaliciousBrowse
                                          Purchase Order___pdf ____________.exeGet hashmaliciousBrowse
                                            quote.exeGet hashmaliciousBrowse
                                              Order83930.exeGet hashmaliciousBrowse
                                                Invoice 6500TH21Y5674.exeGet hashmaliciousBrowse
                                                  Invoice 6500TH21Y5674.exeGet hashmaliciousBrowse
                                                    GPP.exeGet hashmaliciousBrowse
                                                      C:\Users\user\AppData\Local\Temp\z9ayiyo.dllQTN3C2AF414EDF9_041873.xlsxGet hashmaliciousBrowse

                                                        Created / dropped Files

                                                        C:\Users\user\AppData\Local\Temp\nsaBD31.tmp
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):191404
                                                        Entropy (8bit):7.878606044995474
                                                        Encrypted:false
                                                        SSDEEP:3072:2ojw9jwLSvkpGlMfLPVlYB7kc8LvmDgJkIlSFmFp1Su/2PmLNxfYhAWXNt:2ogstrYBJ9Dy3SFSxuPmWrt
                                                        MD5:4FECDED6A29355A90A3D3B3AABBB16E4
                                                        SHA1:F0F16D89E8D1DD35F088CB49298DEA74A3FFF53B
                                                        SHA-256:29680AD46B1D8A090A403798300D02897B547CF3F87FE44ADA08D95C7D34406B
                                                        SHA-512:03889A1FA29D924FD5EB1C293A8D62FAF78876EC5CCF90F7602DC92302DB1D06BC162BDE097A66E9D148C90D0B7920E539CED3D0EF3A9AB4DD230AA73DE7EC7D
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview: ........,...................$...............................................................................................................................................................................................................................................................J...................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        C:\Users\user\AppData\Local\Temp\nsaBD32.tmp\System.dll
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):11776
                                                        Entropy (8bit):5.855045165595541
                                                        Encrypted:false
                                                        SSDEEP:192:xPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4v:g7VpNo8gmOyRsVc4
                                                        MD5:FCCFF8CB7A1067E23FD2E2B63971A8E1
                                                        SHA1:30E2A9E137C1223A78A0F7B0BF96A1C361976D91
                                                        SHA-256:6FCEA34C8666B06368379C6C402B5321202C11B00889401C743FB96C516C679E
                                                        SHA-512:F4335E84E6F8D70E462A22F1C93D2998673A7616C868177CAC3E8784A3BE1D7D0BB96F2583FA0ED82F4F2B6B8F5D9B33521C279A42E055D80A94B4F3F1791E0C
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        • Antivirus: Metadefender, Detection: 0%, Browse
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Joe Sandbox View:
                                                        • Filename: QTN3C2AF414EDF9_041873.xlsx, Detection: malicious, Browse
                                                        • Filename: TIC ENQ2040 FCl.xlsx, Detection: malicious, Browse
                                                        • Filename: lpdKSOB78u.exe, Detection: malicious, Browse
                                                        • Filename: jTmBvrBw7V.exe, Detection: malicious, Browse
                                                        • Filename: 523JHfbGM1.exe, Detection: malicious, Browse
                                                        • Filename: TAk8jeG5ob.exe, Detection: malicious, Browse
                                                        • Filename: PAYMENT COPY.exe, Detection: malicious, Browse
                                                        • Filename: ORDER LIST.xlsx, Detection: malicious, Browse
                                                        • Filename: Orderoffer.exe, Detection: malicious, Browse
                                                        • Filename: Our New Order Feb 23 2021 at 2.30_PVV440_PDF.exe, Detection: malicious, Browse
                                                        • Filename: INV_PR2201.docm, Detection: malicious, Browse
                                                        • Filename: CV-JOB REQUEST______PDF.EXE, Detection: malicious, Browse
                                                        • Filename: Request for Quotation.exe, Detection: malicious, Browse
                                                        • Filename: #U007einvoice#U007eSC00978656.xlsx, Detection: malicious, Browse
                                                        • Filename: Purchase Order___pdf ____________.exe, Detection: malicious, Browse
                                                        • Filename: quote.exe, Detection: malicious, Browse
                                                        • Filename: Order83930.exe, Detection: malicious, Browse
                                                        • Filename: Invoice 6500TH21Y5674.exe, Detection: malicious, Browse
                                                        • Filename: Invoice 6500TH21Y5674.exe, Detection: malicious, Browse
                                                        • Filename: GPP.exe, Detection: malicious, Browse
                                                        Reputation:moderate, very likely benign file
                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....$_...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                        C:\Users\user\AppData\Local\Temp\tjqth.zz
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):164352
                                                        Entropy (8bit):7.998867839876064
                                                        Encrypted:true
                                                        SSDEEP:3072:ajw9jwLSvkpGlMfLPVlYB7kc8LvmDgJkIlSFmFp1Su/2PmLNxfYhAW2:agstrYBJ9Dy3SFSxuPmWo
                                                        MD5:D0AA54167E81FD8C6C7CBC832E178855
                                                        SHA1:7DEB6EB916CCDB8BDF62214F2F3026E9758CBCF6
                                                        SHA-256:C8FD43535A87747A5046D1096717E18CE1E67D1B428498C072F011F3FA9A21E0
                                                        SHA-512:380D39FA1D20BA78F13F91B3B5EA16B058BC864019C8608898941B723E9B04DFEAADDFAF041DC0D888388E056CA188978AEB3797A2C243313772AD83EB7FCFB7
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview: .......Z...~....m...r...~.k.O...Sq....T.E..X.zT..y.*r.{.....s2=...t7^...a.?Gb.4k.).l4e.d.........X.?AO..*.[....].}....0..........j~v...Q.D!A.wA......W.C..@{y...s.#z}.......\x..#4..i.=)dO......#^$..s.._..G{.....8s(...q[..>.D.\U..W....{....6s.?i.:?.{.f.(.|......]..3...^(tS...+..o.N..Kn].,.. %.`.....M^.CRlj3.{.[..i.\-.....l.....+.:YD.....v.c.~[.....~...z.F._a.i/.g\.uF.l..G.D=......:...;...+.F..C...33.R3.[j=...%..G.a{P....KWu....L{...Zr.....6IE<..E&....H..j..;R......K...^}.....CO..v...'ov!..f$j....A...Uh.y.......8'...$.....'aSS.k57.(..}I...U......wL. ...-;....A..qXZ....)*8x.V...1...s....PM.(&j.w..a.R..Rx..<;e2.... ......K..V..c5.lD.eT.n../b..7P..S..I....K~.....K....I..._.p...,:.H.1...4.4.!...6.......?.x...N.*.;.....8..;.Op.u..]...\..B..4J....`.t".BEm.`\..2....;..C.).uV7...m...c...x9W.m#..T....@A2M..(..$S......l$b.8..........4'#..OM.%...\..F.d...|..v.`../x.......#.3.l....1XB.[s..>..g.bz....c.Ax.I.q;O..'. P.n.y..0...c...w9..'\....".s.....1
                                                        C:\Users\user\AppData\Local\Temp\z9ayiyo.dll
                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):11776
                                                        Entropy (8bit):6.6898431043201
                                                        Encrypted:false
                                                        SSDEEP:96:NEBgIVyWyVDSLUpyceXGkLF6HSFLdtyfJHxPVAcnuvmMeT8XfWJ1QhulooeUZi+w:qBnADSLwgXG7yFDixPVmxP4QPCrvLs3
                                                        MD5:94A51F0839DE3A6F5069F766E7BDE4A7
                                                        SHA1:19454F40631ACE4B3DE692C245E3F2551A6794D6
                                                        SHA-256:2D78C0015CEC67CD072ACFB337075825D4A6866D5FAC1B497A649DEB2190F42C
                                                        SHA-512:07468053EFD63FC4B404D87722E0E282B1C5C487CF97E6D858771B67B2574C90D62341FD96D3CFB94ACA6ED357E40657842ADD01E7C563AE170A65450A4EB75A
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 19%
                                                        Joe Sandbox View:
                                                        • Filename: QTN3C2AF414EDF9_041873.xlsx, Detection: malicious, Browse
                                                        Reputation:low
                                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............e.N.e.N.e.N.e.N.e.NI..N.e.N..cN.e.N..gN.e.N..dN.e.N..aN.e.NRich.e.N................PE..L...F.4`...........!.........&............... ...............................p............@.........................P$..I.... .......P.......................`..d.................................................... ...............................code............................... ....rdata....... ......................@..@.data........0......................@....rsrc........P.......*..............@..@.reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................

                                                        Static File Info

                                                        General

                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                        Entropy (8bit):7.895818449493941
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe
                                                        File size:217624
                                                        MD5:2915c0afb0b6b26a5a699965d2119f7a
                                                        SHA1:32fdcc2e0bcfc476347078d7ea05f12d5a259bea
                                                        SHA256:38b6a40d2eeddf38695294c57971fc2efab81fea95100260a2003baa13616b83
                                                        SHA512:b8312043058b28c0eede079425d785b581aabeae63c889ddc4382faa2b070333fc8a6e76f7810678cb9ae96b9e52d6e48604cef9417c565c97c0faadfe36b953
                                                        SSDEEP:6144:611QTAGoul3imDxtHYB19DyzSFSxuPmxF0y:xAjul3i+xlK19JGuOUy
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG..sw..PG..VA..PG.Rich.PG.........PE..L..._.$_.................f...x.......4............@

                                                        File Icon

                                                        Icon Hash:00828e8e8686b000

                                                        Static PE Info

                                                        General

                                                        Entrypoint:0x403486
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                        Time Stamp:0x5F24D75F [Sat Aug 1 02:45:51 2020 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:ea4e67a31ace1a72683a99b80cf37830

                                                        Entrypoint Preview

                                                        Instruction
                                                        sub esp, 00000184h
                                                        push ebx
                                                        push esi
                                                        push edi
                                                        xor ebx, ebx
                                                        push 00008001h
                                                        mov dword ptr [esp+18h], ebx
                                                        mov dword ptr [esp+10h], 0040A130h
                                                        mov dword ptr [esp+20h], ebx
                                                        mov byte ptr [esp+14h], 00000020h
                                                        call dword ptr [004080B0h]
                                                        call dword ptr [004080C0h]
                                                        and eax, BFFFFFFFh
                                                        cmp ax, 00000006h
                                                        mov dword ptr [0042F44Ch], eax
                                                        je 00007FBF008665B3h
                                                        push ebx
                                                        call 00007FBF0086972Eh
                                                        cmp eax, ebx
                                                        je 00007FBF008665A9h
                                                        push 00000C00h
                                                        call eax
                                                        mov esi, 004082A0h
                                                        push esi
                                                        call 00007FBF008696AAh
                                                        push esi
                                                        call dword ptr [004080B8h]
                                                        lea esi, dword ptr [esi+eax+01h]
                                                        cmp byte ptr [esi], bl
                                                        jne 00007FBF0086658Dh
                                                        push 0000000Bh
                                                        call 00007FBF00869702h
                                                        push 00000009h
                                                        call 00007FBF008696FBh
                                                        push 00000007h
                                                        mov dword ptr [0042F444h], eax
                                                        call 00007FBF008696EFh
                                                        cmp eax, ebx
                                                        je 00007FBF008665B1h
                                                        push 0000001Eh
                                                        call eax
                                                        test eax, eax
                                                        je 00007FBF008665A9h
                                                        or byte ptr [0042F44Fh], 00000040h
                                                        push ebp
                                                        call dword ptr [00408038h]
                                                        push ebx
                                                        call dword ptr [00408288h]
                                                        mov dword ptr [0042F518h], eax
                                                        push ebx
                                                        lea eax, dword ptr [esp+38h]
                                                        push 00000160h
                                                        push eax
                                                        push ebx
                                                        push 00429878h
                                                        call dword ptr [0040816Ch]
                                                        push 0040A1ECh

                                                        Rich Headers

                                                        Programming Language:
                                                        • [EXP] VC++ 6.0 SP5 build 8804

                                                        Data Directories

                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x85440xa0.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x380000x97c.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x29c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                        Sections

                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x65ad0x6600False0.675628063725data6.48593060343IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                        .rdata0x80000x13800x1400False0.4634765625data5.26110074066IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xa0000x255580x600False0.470052083333data4.21916068772IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                        .ndata0x300000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .rsrc0x380000x97c0xa00False0.453515625data4.29529055645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                        Resources

                                                        NameRVASizeTypeLanguageCountry
                                                        RT_DIALOG0x381480x100dataEnglishUnited States
                                                        RT_DIALOG0x382480x11cdataEnglishUnited States
                                                        RT_DIALOG0x383640x60dataEnglishUnited States
                                                        RT_VERSION0x383c40x278dataEnglishUnited States
                                                        RT_MANIFEST0x3863c0x340XML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                                                        Imports

                                                        DLLImport
                                                        ADVAPI32.dllRegCreateKeyExA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, SetFileSecurityA, RegOpenKeyExA, RegEnumValueA
                                                        SHELL32.dllSHGetFileInfoA, SHFileOperationA, SHGetPathFromIDListA, ShellExecuteExA, SHGetSpecialFolderLocation, SHBrowseForFolderA
                                                        ole32.dllIIDFromString, OleInitialize, OleUninitialize, CoCreateInstance, CoTaskMemFree
                                                        COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                        USER32.dllSetClipboardData, CharPrevA, CallWindowProcA, PeekMessageA, DispatchMessageA, MessageBoxIndirectA, GetDlgItemTextA, SetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, TrackPopupMenu, FillRect, EmptyClipboard, LoadCursorA, GetMessagePos, CheckDlgButton, GetSysColor, SetCursor, GetWindowLongA, SetClassLongA, SetWindowPos, IsWindowEnabled, GetWindowRect, GetSystemMenu, EnableMenuItem, RegisterClassA, ScreenToClient, EndDialog, GetClassInfoA, SystemParametersInfoA, CreateWindowExA, ExitWindowsEx, DialogBoxParamA, CharNextA, SetTimer, DestroyWindow, CreateDialogParamA, SetForegroundWindow, SetWindowTextA, PostQuitMessage, SendMessageTimeoutA, ShowWindow, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, GetDC, SetWindowLongA, LoadImageA, InvalidateRect, ReleaseDC, EnableWindow, BeginPaint, SendMessageA, DefWindowProcA, DrawTextA, GetClientRect, EndPaint, IsWindowVisible, CloseClipboard, OpenClipboard
                                                        GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                        KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetProcAddress, GetSystemDirectoryA, WideCharToMultiByte, MoveFileExA, GetTempFileNameA, RemoveDirectoryA, WriteFile, CreateDirectoryA, GetLastError, CreateProcessA, GlobalLock, GlobalUnlock, CreateThread, lstrcpynA, SetErrorMode, GetDiskFreeSpaceA, lstrlenA, GetCommandLineA, GetVersion, GetWindowsDirectoryA, SetEnvironmentVariableA, GetTempPathA, CopyFileA, GetCurrentProcess, ExitProcess, GetModuleFileNameA, GetFileSize, ReadFile, GetTickCount, Sleep, CreateFileA, GetFileAttributesA, SetCurrentDirectoryA, SetFileAttributesA, GetFullPathNameA, GetShortPathNameA, MoveFileA, CompareFileTime, SetFileTime, SearchPathA, lstrcmpiA, lstrcmpA, CloseHandle, GlobalFree, GlobalAlloc, ExpandEnvironmentStringsA, LoadLibraryExA, FreeLibrary, lstrcpyA, lstrcatA, FindClose, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, GetModuleHandleA, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv

                                                        Version Infos

                                                        DescriptionData
                                                        LegalCopyrightCopyright fuel-air explosive
                                                        FileVersion69.46.40.87
                                                        CompanyNamearithmetic
                                                        LegalTrademarksstack
                                                        CommentsDone-S
                                                        ProductNamedehumidify
                                                        FileDescriptionentail
                                                        Translation0x0409 0x04e4

                                                        Possible Origin

                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishUnited States

                                                        Network Behavior

                                                        No network behavior found

                                                        Code Manipulations

                                                        Statistics

                                                        Behavior

                                                        Click to jump to process

                                                        System Behavior

                                                        General

                                                        Start time:11:51:33
                                                        Start date:23/02/2021
                                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe'
                                                        Imagebase:0x400000
                                                        File size:217624 bytes
                                                        MD5 hash:2915C0AFB0B6B26A5A699965D2119F7A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.211020267.0000000002A50000.00000004.00000001.sdmp, Author: Joe Security
                                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.211020267.0000000002A50000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.211020267.0000000002A50000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                        Reputation:low

                                                        General

                                                        Start time:11:51:34
                                                        Start date:23/02/2021
                                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.RL_Androm.R367639.12654.exe'
                                                        Imagebase:0x400000
                                                        File size:217624 bytes
                                                        MD5 hash:2915C0AFB0B6B26A5A699965D2119F7A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000001.209279370.0000000000400000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.211005470.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.211005470.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.211005470.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                        Reputation:low

                                                        Disassembly

                                                        Code Analysis

                                                        Reset < >