Loading ...

Play interactive tourEdit tour

Analysis Report Portfolio.exe

Overview

General Information

Sample Name:Portfolio.exe
Analysis ID:385265
MD5:9fa479c87543e7dd199296f7029991c9
SHA1:649bf55700b6828989dbcf4c5d792ba93fa5b2e0
SHA256:5cb8d74227cc43368e24ef8f94c5ae38a2f2c259a1701b1efa4f6b5042e4544d
Tags:exeFormbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected FormBook
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • Portfolio.exe (PID: 5880 cmdline: 'C:\Users\user\Desktop\Portfolio.exe' MD5: 9FA479C87543E7DD199296F7029991C9)
    • Portfolio.exe (PID: 2964 cmdline: C:\Users\user\Desktop\Portfolio.exe MD5: 9FA479C87543E7DD199296F7029991C9)
      • explorer.exe (PID: 3472 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • mstsc.exe (PID: 1320 cmdline: C:\Windows\SysWOW64\mstsc.exe MD5: 2412003BE253A515C620CE4890F3D8F3)
          • cmd.exe (PID: 6216 cmdline: /c del 'C:\Users\user\Desktop\Portfolio.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 6236 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.fromthepittothepitts.com/dwj/"], "decoy": ["timemine.net", "hochzeitsfotograf-kirchheim.com", "pinebrotherstreeservices.com", "nitthaidessert.com", "azbysdqis.icu", "lamamex.com", "betonelon.com", "instagram-copyrighteam.com", "balela.info", "silversageresidentialllc.com", "receitaideal.com", "di-rinse.com", "relicensetests.com", "wobidoo.singles", "sanjosemicroschools.com", "southwonstondogtrainingclub.com", "vasayopianju.com", "falcontehnik.com", "hoytslandscaping.com", "colorprintagencia.com", "72222006.com", "rqgxbl.com", "bike-open.com", "delivachelicatering.com", "eorpp.com", "indianwants.com", "byonf.com", "damayaran.com", "rhusart-shop.com", "elusivelabs.net", "medeins.com", "itristore.com", "andalusier-united.com", "andersensweddinginvitations.com", "devinpennings.com", "vinegret.com", "veravzznt.asia", "facemaskbuyer.com", "oregonbirdhouse.com", "onyxcondoms.com", "cutfd.com", "856379601.xyz", "notmad-nomads.com", "eversourcecredit.com", "scaledsales.com", "hailstoneclayfairy.com", "merishare.com", "verified-igcenter.com", "thehappytester.com", "act360.xyz", "warehouseteam.com", "lingwid.com", "bodyizaverb.store", "oldguyinthesky.com", "cualosun.com", "timcrozier.com", "binghamtonplumber.com", "1956west10th.com", "covid-19sales.com", "anshcgsab50sd.com", "wfxinbang.com", "eldiaqueashtonmetwitteo.com", "cmhbhhy.icu", "cursosinemlinea.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18409:$sqlite3step: 68 34 1C 7B E1
    • 0x1851c:$sqlite3step: 68 34 1C 7B E1
    • 0x18438:$sqlite3text: 68 38 2A 90 C5
    • 0x1855d:$sqlite3text: 68 38 2A 90 C5
    • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
    0000000E.00000002.501446234.0000000004E40000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000E.00000002.501446234.0000000004E40000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 18 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      3.2.Portfolio.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        3.2.Portfolio.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x14885:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x14371:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x14987:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14aff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x977a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x135ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa473:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1a527:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1b52a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        3.2.Portfolio.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x17609:$sqlite3step: 68 34 1C 7B E1
        • 0x1771c:$sqlite3step: 68 34 1C 7B E1
        • 0x17638:$sqlite3text: 68 38 2A 90 C5
        • 0x1775d:$sqlite3text: 68 38 2A 90 C5
        • 0x1764b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17773:$sqlite3blob: 68 53 D8 7F 8C
        3.2.Portfolio.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          3.2.Portfolio.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 1 entries

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.fromthepittothepitts.com/dwj/"], "decoy": ["timemine.net", "hochzeitsfotograf-kirchheim.com", "pinebrotherstreeservices.com", "nitthaidessert.com", "azbysdqis.icu", "lamamex.com", "betonelon.com", "instagram-copyrighteam.com", "balela.info", "silversageresidentialllc.com", "receitaideal.com", "di-rinse.com", "relicensetests.com", "wobidoo.singles", "sanjosemicroschools.com", "southwonstondogtrainingclub.com", "vasayopianju.com", "falcontehnik.com", "hoytslandscaping.com", "colorprintagencia.com", "72222006.com", "rqgxbl.com", "bike-open.com", "delivachelicatering.com", "eorpp.com", "indianwants.com", "byonf.com", "damayaran.com", "rhusart-shop.com", "elusivelabs.net", "medeins.com", "itristore.com", "andalusier-united.com", "andersensweddinginvitations.com", "devinpennings.com", "vinegret.com", "veravzznt.asia", "facemaskbuyer.com", "oregonbirdhouse.com", "onyxcondoms.com", "cutfd.com", "856379601.xyz", "notmad-nomads.com", "eversourcecredit.com", "scaledsales.com", "hailstoneclayfairy.com", "merishare.com", "verified-igcenter.com", "thehappytester.com", "act360.xyz", "warehouseteam.com", "lingwid.com", "bodyizaverb.store", "oldguyinthesky.com", "cualosun.com", "timcrozier.com", "binghamtonplumber.com", "1956west10th.com", "covid-19sales.com", "anshcgsab50sd.com", "wfxinbang.com", "eldiaqueashtonmetwitteo.com", "cmhbhhy.icu", "cursosinemlinea.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: Portfolio.exeVirustotal: Detection: 34%Perma Link
          Source: Portfolio.exeReversingLabs: Detection: 16%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.501446234.0000000004E40000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.293921450.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.294742769.00000000015F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.500122632.0000000003030000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.501316678.0000000004E10000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.252926038.00000000045D5000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.2.Portfolio.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.Portfolio.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Machine Learning detection for sampleShow sources
          Source: Portfolio.exeJoe Sandbox ML: detected
          Source: 3.2.Portfolio.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: Portfolio.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: Portfolio.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: Portfolio.exe, 00000003.00000003.249066077.00000000017C0000.00000004.00000001.sdmp, mstsc.exe, 0000000E.00000002.501901924.0000000005060000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: Portfolio.exe, mstsc.exe
          Source: Binary string: mstsc.pdbGCTL source: Portfolio.exe, 00000003.00000002.296664211.0000000003570000.00000040.00000001.sdmp
          Source: Binary string: mstsc.pdb source: Portfolio.exe, 00000003.00000002.296664211.0000000003570000.00000040.00000001.sdmp
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 4x nop then pop edi

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.fromthepittothepitts.com/dwj/
          Source: global trafficHTTP traffic detected: GET /dwj/?Cj=lN985vvxrLh4&HTrLdvY=vjdFX+deElwkJL3jjCyofcRGlviK7hY6fmHNPu6niYhLdTNZ+9C3ClVYQHWQZWwEwEGo HTTP/1.1Host: www.timcrozier.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /dwj/?HTrLdvY=e+9w//LrkNQAvat7yjjfVebmP7O5RIC5nL700LrPx65Ls1GCtX2Cw2Ubn7E5A1TTieM1&Cj=lN985vvxrLh4 HTTP/1.1Host: www.fromthepittothepitts.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /dwj/?Cj=lN985vvxrLh4&HTrLdvY=jCwgb33wmR2YDM1wuLgRTH38yeb9sMyK3XA0ZXE7/yU9OdwyZBI+RqEK8elpwbEptz+b HTTP/1.1Host: www.scaledsales.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 72.167.241.46 72.167.241.46
          Source: Joe Sandbox ViewASN Name: AS-26496-GO-DADDY-COM-LLCUS AS-26496-GO-DADDY-COM-LLCUS
          Source: Joe Sandbox ViewASN Name: CLAYERLIMITED-AS-APClayerLimitedHK CLAYERLIMITED-AS-APClayerLimitedHK
          Source: global trafficHTTP traffic detected: GET /dwj/?Cj=lN985vvxrLh4&HTrLdvY=vjdFX+deElwkJL3jjCyofcRGlviK7hY6fmHNPu6niYhLdTNZ+9C3ClVYQHWQZWwEwEGo HTTP/1.1Host: www.timcrozier.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /dwj/?HTrLdvY=e+9w//LrkNQAvat7yjjfVebmP7O5RIC5nL700LrPx65Ls1GCtX2Cw2Ubn7E5A1TTieM1&Cj=lN985vvxrLh4 HTTP/1.1Host: www.fromthepittothepitts.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /dwj/?Cj=lN985vvxrLh4&HTrLdvY=jCwgb33wmR2YDM1wuLgRTH38yeb9sMyK3XA0ZXE7/yU9OdwyZBI+RqEK8elpwbEptz+b HTTP/1.1Host: www.scaledsales.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: unknownDNS traffic detected: queries for: clientconfig.passport.net
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 12 Apr 2021 07:18:14 GMTContent-Type: text/htmlContent-Length: 479Connection: closeETag: "5cf0c6a3-1df"Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 6e 6f 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 3c 73 74 79 6c 65 3e 0a 09 62 6f 64 79 7b 0a 09 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 34 34 34 3b 0a 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 0a 09 7d 0a 09 68 33 7b 0a 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 36 30 70 78 3b 0a 09 09 63 6f 6c 6f 72 3a 23 65 65 65 3b 0a 09 09 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 0a 09 09 70 61 64 64 69 6e 67 2d 74 6f 70 3a 33 30 70 78 3b 0a 09 09 66 6f 6e 74 2d 77 65 69 67 68 74 3a 6e 6f 72 6d 61 6c 3b 0a 09 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 0a 3c 62 6f 64 79 3e 0a 3c 68 33 3e 34 30 34 ef bc 8c e6 82 a8 e8 af b7 e6 b1 82 e7 9a 84 e6 96 87 e4 bb b6 e4 b8 8d e5 ad 98 e5 9c a8 21 3c 2f 68 33 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!doctype html><html><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1, user-scalable=no"><title>404</title><style>body{background-color:#444;font-size:14px;}h3{font-size:60px;color:#eee;text-align:center;padding-top:30px;font-weight:normal;}</style></head><body><h3>404!</h3></body></html>
          Source: Portfolio.exe, 00000000.00000003.228584223.0000000001B0D000.00000004.00000001.sdmpString found in binary or memory: http://en.wg
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: Portfolio.exe, 00000000.00000002.249960275.0000000003421000.00000004.00000001.sdmp, Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name4
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: Portfolio.exe, 00000000.00000002.255677929.0000000006450000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: Portfolio.exe, 00000000.00000003.234330110.000000000645D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8g
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: Portfolio.exe, 00000000.00000003.233964245.0000000006459000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersP
          Source: Portfolio.exe, 00000000.00000002.255677929.0000000006450000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.come.com
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: Portfolio.exe, 00000000.00000003.229070547.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com-uK2
          Source: Portfolio.exe, 00000000.00000003.229070547.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comF
          Source: Portfolio.exe, 00000000.00000003.229124720.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comc
          Source: Portfolio.exe, 00000000.00000003.229044893.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comic
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: Portfolio.exe, 00000000.00000003.231020561.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
          Source: Portfolio.exe, 00000000.00000003.231020561.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/1
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: Portfolio.exe, 00000000.00000003.230728863.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnFe
          Source: Portfolio.exe, 00000000.00000003.230728863.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnnte
          Source: Portfolio.exe, 00000000.00000003.230728863.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnorm
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: Portfolio.exe, 00000000.00000003.232390770.0000000006454000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: Portfolio.exe, 00000000.00000003.232390770.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Zp
          Source: Portfolio.exe, 00000000.00000003.232390770.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ana
          Source: Portfolio.exe, 00000000.00000003.232390770.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ip
          Source: Portfolio.exe, 00000000.00000003.232390770.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
          Source: Portfolio.exe, 00000000.00000003.232390770.0000000006454000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/tp&
          Source: Portfolio.exe, 00000000.00000003.228912347.000000000646B000.00000004.00000001.sdmp, Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: Portfolio.exe, 00000000.00000003.228912347.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comd
          Source: Portfolio.exe, 00000000.00000003.228912347.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comif13
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: Portfolio.exe, 00000000.00000003.230122037.0000000006459000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr0l
          Source: Portfolio.exe, 00000000.00000003.230122037.0000000006459000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krN.TTF
          Source: Portfolio.exe, 00000000.00000003.230122037.0000000006459000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krs.
          Source: explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: Portfolio.exe, 00000000.00000003.229361711.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comc
          Source: Portfolio.exe, 00000000.00000003.229361711.000000000646B000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comh
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.501446234.0000000004E40000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.293921450.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.294742769.00000000015F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.500122632.0000000003030000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.501316678.0000000004E10000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.252926038.00000000045D5000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.2.Portfolio.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.Portfolio.exe.400000.0.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000E.00000002.501446234.0000000004E40000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000E.00000002.501446234.0000000004E40000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.293921450.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.293921450.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.294742769.00000000015F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.294742769.00000000015F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000E.00000002.500122632.0000000003030000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000E.00000002.500122632.0000000003030000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000E.00000002.501316678.0000000004E10000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000E.00000002.501316678.0000000004E10000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.252926038.00000000045D5000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.252926038.00000000045D5000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.Portfolio.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.Portfolio.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.Portfolio.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.Portfolio.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00419D60 NtCreateFile,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00419E10 NtReadFile,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00419E90 NtClose,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00419F40 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00419E0A NtReadFile,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00419E8A NtClose,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00419F3A NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C95D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C98F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C97A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C99D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C95F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019CAD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9560 NtWriteFile,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C98A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019CB040 NtSuspendThread,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019CA3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9FE0 NtCreateMutant,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019CA710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019CA770 NtOpenThread,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9760 NtOpenProcess,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C96D0 NtCreateKey,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9A10 NtQuerySection,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C9670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C95D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C96D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050CAD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9560 NtWriteFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C99D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C95F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050CB040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C98A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C98F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050CA710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050CA770 NtOpenThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C97A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050CA3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C9A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_03049F40 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_03049E10 NtReadFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_03049E90 NtClose,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_03049D60 NtCreateFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_03049F3A NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_03049E0A NtReadFile,
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_03049E8A NtClose,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_019EC2B0
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_019E9968
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_01AD38A0
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_01AD0040
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_01AD0548
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_01AD6930
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_01AD0006
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_01AD0538
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_01AD34E8
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_01AD07E8
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_01AD07D8
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00401030
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0041E91E
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00402D90
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00409E40
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00409E3B
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0041CFE6
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00402FB0
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B2581
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A525DD
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199D5E0
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198F900
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A52D07
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01980D20
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019A4120
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A51D55
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199B090
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A520A8
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B20A0
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A528EC
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199841F
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41002
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A4D466
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BEBB0
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A51FF1
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A4DBD2
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A52B28
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A522AE
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A52EF7
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019A6E30
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508F900
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05152D07
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05080D20
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050A4120
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05151D55
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051525DD
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0509D5E0
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141002
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0509841F
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0509B090
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B20A0
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051520A8
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051528EC
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05152B28
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BEBB0
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0514DBD2
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05151FF1
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050A6E30
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051522AE
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05152EF7
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0304E91E
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_03032FB0
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0304CFE6
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_03039E3B
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_03039E40
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_03032D90
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: String function: 0508B150 appears 35 times
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: String function: 0198B150 appears 35 times
          Source: Portfolio.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: Portfolio.exeBinary or memory string: OriginalFilename vs Portfolio.exe
          Source: Portfolio.exe, 00000000.00000000.226189081.0000000000FD2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSiteString.exe> vs Portfolio.exe
          Source: Portfolio.exe, 00000000.00000002.249960275.0000000003421000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll2 vs Portfolio.exe
          Source: Portfolio.exe, 00000000.00000002.265213132.0000000008020000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Portfolio.exe
          Source: Portfolio.exe, 00000000.00000002.262888955.0000000007C70000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll" vs Portfolio.exe
          Source: Portfolio.exeBinary or memory string: OriginalFilename vs Portfolio.exe
          Source: Portfolio.exe, 00000003.00000003.249237586.00000000018DF000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Portfolio.exe
          Source: Portfolio.exe, 00000003.00000002.297252158.0000000003693000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamemstsc.exej% vs Portfolio.exe
          Source: Portfolio.exe, 00000003.00000002.294010174.0000000000DA2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSiteString.exe> vs Portfolio.exe
          Source: Portfolio.exeBinary or memory string: OriginalFilenameSiteString.exe> vs Portfolio.exe
          Source: Portfolio.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000E.00000002.501446234.0000000004E40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000E.00000002.501446234.0000000004E40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.293921450.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.293921450.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.294742769.00000000015F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.294742769.00000000015F0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000E.00000002.500122632.0000000003030000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000E.00000002.500122632.0000000003030000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000E.00000002.501316678.0000000004E10000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000E.00000002.501316678.0000000004E10000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.252926038.00000000045D5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.252926038.00000000045D5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.Portfolio.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.Portfolio.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.Portfolio.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.Portfolio.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Portfolio.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@5/3
          Source: C:\Users\user\Desktop\Portfolio.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Portfolio.exe.logJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6236:120:WilError_01
          Source: Portfolio.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Portfolio.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\Portfolio.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: Select * from UnmanagedMemoryStreamWrapper WHERE modelo=@modelo;?
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel5Erro ao listar Banco sql-UnmanagedMemoryStreamWrapper.INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: INSERT INTO UnmanagedMemoryStreamWrapper VALUES(@modelo, @fabricante, @ano, @cor);
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: Portfolio.exeVirustotal: Detection: 34%
          Source: Portfolio.exeReversingLabs: Detection: 16%
          Source: unknownProcess created: C:\Users\user\Desktop\Portfolio.exe 'C:\Users\user\Desktop\Portfolio.exe'
          Source: C:\Users\user\Desktop\Portfolio.exeProcess created: C:\Users\user\Desktop\Portfolio.exe C:\Users\user\Desktop\Portfolio.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\mstsc.exe C:\Windows\SysWOW64\mstsc.exe
          Source: C:\Windows\SysWOW64\mstsc.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\Portfolio.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Portfolio.exeProcess created: C:\Users\user\Desktop\Portfolio.exe C:\Users\user\Desktop\Portfolio.exe
          Source: C:\Windows\SysWOW64\mstsc.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\Portfolio.exe'
          Source: C:\Users\user\Desktop\Portfolio.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: Portfolio.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: Portfolio.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: Portfolio.exe, 00000003.00000003.249066077.00000000017C0000.00000004.00000001.sdmp, mstsc.exe, 0000000E.00000002.501901924.0000000005060000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: Portfolio.exe, mstsc.exe
          Source: Binary string: mstsc.pdbGCTL source: Portfolio.exe, 00000003.00000002.296664211.0000000003570000.00000040.00000001.sdmp
          Source: Binary string: mstsc.pdb source: Portfolio.exe, 00000003.00000002.296664211.0000000003570000.00000040.00000001.sdmp
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_00FDAE61 push es; ret
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_00FD8051 push ss; ret
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_00FD809B push ss; ret
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 0_2_019E04D0 push C0330169h; ret
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0040E3E2 pushad ; retf
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0041CEB5 push eax; ret
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_004166B4 push ebp; ret
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0041CF6C push eax; ret
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0041CF02 push eax; ret
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0041CF0B push eax; ret
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00DA809B push ss; ret
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00DA8051 push ss; ret
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00DAAE61 push es; ret
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019DD0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050DD0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0303E3E2 pushad ; retf
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0304CF02 push eax; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0304CF0B push eax; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0304CF6C push eax; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_030466B4 push ebp; ret
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0304CEB5 push eax; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.95191633624

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8C 0xCE 0xE1
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\mstsc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Portfolio.exe PID: 5880, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\Portfolio.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\Portfolio.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\mstsc.exeRDTSC instruction interceptor: First address: 00000000030398E4 second address: 00000000030398EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\mstsc.exeRDTSC instruction interceptor: First address: 0000000003039B5E second address: 0000000003039B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\Portfolio.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Portfolio.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Portfolio.exe TID: 5724Thread sleep time: -104352s >= -30000s
          Source: C:\Users\user\Desktop\Portfolio.exe TID: 2908Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\Portfolio.exe TID: 5436Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exe TID: 6520Thread sleep count: 34 > 30
          Source: C:\Windows\explorer.exe TID: 6520Thread sleep time: -68000s >= -30000s
          Source: C:\Windows\SysWOW64\mstsc.exe TID: 496Thread sleep time: -65000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\Portfolio.exeThread delayed: delay time: 104352
          Source: C:\Users\user\Desktop\Portfolio.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\Portfolio.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 00000006.00000000.275104584.000000000891C000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: explorer.exe, 00000006.00000002.504801395.0000000003710000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000006.00000000.274706890.0000000008270000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: explorer.exe, 00000006.00000002.496597922.00000000011B3000.00000004.00000020.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000tft\0
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000006.00000000.275169034.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000%
          Source: explorer.exe, 00000006.00000000.269571031.00000000053C4000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}>'R\"
          Source: explorer.exe, 00000006.00000000.274706890.0000000008270000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: explorer.exe, 00000006.00000000.274706890.0000000008270000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: explorer.exe, 00000006.00000000.275169034.00000000089B5000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000002
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: explorer.exe, 00000006.00000000.274706890.0000000008270000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\Portfolio.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\Portfolio.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\mstsc.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0040ACD0 LdrLoadDll,
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A069A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A505AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A505AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01982D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01982D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01982D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01982D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01982D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019AC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A4FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A4FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A4FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A4FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A141E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A38DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A06DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A06DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A06DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A06DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A06DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A06DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A58D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A0A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01989100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01989100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01989100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A4E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01993D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01993D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01993D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01993D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01993D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01993D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01993D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01993D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01993D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01993D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01993D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01993D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01993D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019A4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019A4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019A4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019A4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019A4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019A7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019AB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019AB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A03540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019AC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019AC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01989080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A03884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A03884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A06CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A06CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A06CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A414FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A1B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A58CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019858EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A5740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A5740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A5740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A06C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A06C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A06C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A06C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A54015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A54015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A07016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A07016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A07016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019A0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019A0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A51074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A42073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A1C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A1C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019A746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A55BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B2397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01998794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01991B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01991B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A3D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A4138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A07794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A07794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A07794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A053CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A053CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019ADBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019AF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A5070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A5070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A1FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A1FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01984F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01984F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A4131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A58F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A58B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A50EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A50EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A50EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A046A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A1FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C8EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A3FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A58ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019976E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019A3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019BA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01985210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01985210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01985210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01985210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01998A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019B8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A3FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A41608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0198E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A3B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A3B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A58A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01989240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01989240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01989240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01989240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01997E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01997E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01997E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01997E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01997E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01997E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A4AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A4AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019C927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019AAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019AAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019AAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019AAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_019AAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A4EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_0199766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeCode function: 3_2_01A14257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05089100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05089100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05089100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05158D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0510A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050A4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050A4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050A4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050A4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050A4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0514E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05093D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05093D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05093D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05093D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05093D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05093D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05093D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05093D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05093D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05093D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05093D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05093D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05093D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050AB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050AB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05103540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050A7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050AC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050AC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05082D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05082D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05082D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05082D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05082D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050AC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051069A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051505AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051505AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05106DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05106DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05106DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05106DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05106DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05106DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05138DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0509D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0509D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0514FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0514FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0514FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0514FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051141E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05154015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05154015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05107016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05107016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05107016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0515740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0515740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0515740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05106C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05106C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05106C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05106C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0509B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0509B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0509B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0509B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0511C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0511C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050A0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050A0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05151074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05142073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050A746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05089080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0509849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05103884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05103884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0511B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0511B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0511B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0511B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0511B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0511B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05158CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05106CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05106CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05106CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050858EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051414FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0511FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0511FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0514131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0515070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0515070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050AF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05084F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05084F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0509EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05158B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0509FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05158F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05107794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05107794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05107794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05091B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05091B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0513D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B2397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05098794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0514138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05155BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051053CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_051053CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050ADBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05098A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050B8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050A3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050BA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05085210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05085210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05085210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05085210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05141608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0508E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0513FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0514EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05114257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05089240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05089240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05089240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05089240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05097E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05097E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05097E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05097E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05097E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05097E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0514AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0514AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0509766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0513B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_0513B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050C927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_05158A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050AAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050AAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050AAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\mstsc.exeCode function: 14_2_050AAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\Portfolio.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\Portfolio.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\mstsc.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\Portfolio.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 72.167.241.46 80
          Source: C:\Windows\explorer.exeDomain query: www.timcrozier.com
          Source: C:\Windows\explorer.exeNetwork Connect: 168.206.243.213 80
          Source: C:\Windows\explorer.exeDomain query: www.scaledsales.com
          Source: C:\Windows\explorer.exeDomain query: www.fromthepittothepitts.com
          Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\Portfolio.exeMemory written: C:\Users\user\Desktop\Portfolio.exe base: 400000 value starts with: 4D5A
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\Portfolio.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\Portfolio.exeSection loaded: unknown target: C:\Windows\SysWOW64\mstsc.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\Portfolio.exeSection loaded: unknown target: C:\Windows\SysWOW64\mstsc.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\Portfolio.exeThread register set: target process: 3472
          Source: C:\Windows\SysWOW64\mstsc.exeThread register set: target process: 3472
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\Portfolio.exeThread APC queued: target process: C:\Windows\explorer.exe
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\Portfolio.exeSection unmapped: C:\Windows\SysWOW64\mstsc.exe base address: C70000
          Source: C:\Users\user\Desktop\Portfolio.exeProcess created: C:\Users\user\Desktop\Portfolio.exe C:\Users\user\Desktop\Portfolio.exe
          Source: C:\Windows\SysWOW64\mstsc.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\Portfolio.exe'
          Source: explorer.exe, 00000006.00000000.270667428.0000000005EA0000.00000004.00000001.sdmp, mstsc.exe, 0000000E.00000002.500691219.0000000003910000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000006.00000000.253301402.0000000001640000.00000002.00000001.sdmp, mstsc.exe, 0000000E.00000002.500691219.0000000003910000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000006.00000000.253301402.0000000001640000.00000002.00000001.sdmp, mstsc.exe, 0000000E.00000002.500691219.0000000003910000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
          Source: explorer.exe, 00000006.00000002.496420831.0000000001128000.00000004.00000020.sdmpBinary or memory string: ProgmanOMEa
          Source: explorer.exe, 00000006.00000000.253301402.0000000001640000.00000002.00000001.sdmp, mstsc.exe, 0000000E.00000002.500691219.0000000003910000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
          Source: explorer.exe, 00000006.00000000.253301402.0000000001640000.00000002.00000001.sdmp, mstsc.exe, 0000000E.00000002.500691219.0000000003910000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Users\user\Desktop\Portfolio.exe VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\Portfolio.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.501446234.0000000004E40000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.293921450.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.294742769.00000000015F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.500122632.0000000003030000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.501316678.0000000004E10000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.252926038.00000000045D5000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.2.Portfolio.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.Portfolio.exe.400000.0.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.501446234.0000000004E40000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.293921450.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.294742769.00000000015F0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.500122632.0000000003030000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.501316678.0000000004E10000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.252926038.00000000045D5000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 3.2.Portfolio.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.Portfolio.exe.400000.0.raw.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection612Rootkit1Credential API Hooking1Security Software Discovery221Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion31NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing3Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 385265 Sample: Portfolio.exe Startdate: 12/04/2021 Architecture: WINDOWS Score: 100 31 clientconfig.passport.net 2->31 33 www.andersensweddinginvitations.com 2->33 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 6 other signatures 2->47 11 Portfolio.exe 3 2->11         started        signatures3 process4 file5 29 C:\Users\user\AppData\...\Portfolio.exe.log, ASCII 11->29 dropped 57 Tries to detect virtualization through RDTSC time measurements 11->57 59 Injects a PE file into a foreign processes 11->59 15 Portfolio.exe 11->15         started        signatures6 process7 signatures8 61 Modifies the context of a thread in another process (thread injection) 15->61 63 Maps a DLL or memory area into another process 15->63 65 Sample uses process hollowing technique 15->65 67 Queues an APC in another process (thread injection) 15->67 18 explorer.exe 15->18 injected process9 dnsIp10 35 www.timcrozier.com 168.206.243.213, 49718, 80 CLAYERLIMITED-AS-APClayerLimitedHK South Africa 18->35 37 fromthepittothepitts.com 72.167.241.46, 49726, 80 AS-26496-GO-DADDY-COM-LLCUS United States 18->37 39 3 other IPs or domains 18->39 49 System process connects to network (likely due to code injection or exploit) 18->49 22 mstsc.exe 18->22         started        signatures11 process12 signatures13 51 Modifies the context of a thread in another process (thread injection) 22->51 53 Maps a DLL or memory area into another process 22->53 55 Tries to detect virtualization through RDTSC time measurements 22->55 25 cmd.exe 1 22->25         started        process14 process15 27 conhost.exe 25->27         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          Portfolio.exe34%VirustotalBrowse
          Portfolio.exe17%ReversingLabsWin32.Trojan.AgentTesla
          Portfolio.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          3.2.Portfolio.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          SourceDetectionScannerLabelLink
          scaledsales.com0%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cnnte0%Avira URL Cloudsafe
          http://www.sajatypeworks.comif130%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.founder.com.cn/cnorm0%Avira URL Cloudsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://en.wg0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.fonts.comic0%URL Reputationsafe
          http://www.fonts.comic0%URL Reputationsafe
          http://www.fonts.comic0%URL Reputationsafe
          http://www.fonts.com-uK20%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/ana0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sajatypeworks.comd0%Avira URL Cloudsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.fonts.comc0%URL Reputationsafe
          http://www.fonts.comc0%URL Reputationsafe
          http://www.fonts.comc0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Zp0%Avira URL Cloudsafe
          www.fromthepittothepitts.com/dwj/0%Avira URL Cloudsafe
          http://www.sandoll.co.krN.TTF0%Avira URL Cloudsafe
          http://www.sandoll.co.krs.0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/tp&0%Avira URL Cloudsafe
          http://www.fontbureau.come.com0%URL Reputationsafe
          http://www.fontbureau.come.com0%URL Reputationsafe
          http://www.fontbureau.come.com0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.scaledsales.com/dwj/?Cj=lN985vvxrLh4&HTrLdvY=jCwgb33wmR2YDM1wuLgRTH38yeb9sMyK3XA0ZXE7/yU9OdwyZBI+RqEK8elpwbEptz+b0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/0%URL Reputationsafe
          http://www.founder.com.cn/cn/0%URL Reputationsafe
          http://www.founder.com.cn/cn/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/ip0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.fromthepittothepitts.com/dwj/?HTrLdvY=e+9w//LrkNQAvat7yjjfVebmP7O5RIC5nL700LrPx65Ls1GCtX2Cw2Ubn7E5A1TTieM1&Cj=lN985vvxrLh40%Avira URL Cloudsafe
          http://www.timcrozier.com/dwj/?Cj=lN985vvxrLh4&HTrLdvY=vjdFX+deElwkJL3jjCyofcRGlviK7hY6fmHNPu6niYhLdTNZ+9C3ClVYQHWQZWwEwEGo0%Avira URL Cloudsafe
          http://www.fonts.comF0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.sandoll.co.kr0l0%Avira URL Cloudsafe
          http://www.tiro.comh0%Avira URL Cloudsafe
          http://www.tiro.comc0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/10%Avira URL Cloudsafe
          http://www.founder.com.cn/cnFe0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          fromthepittothepitts.com
          72.167.241.46
          truetrue
            unknown
            www.timcrozier.com
            168.206.243.213
            truetrue
              unknown
              scaledsales.com
              34.102.136.180
              truefalseunknown
              www.andersensweddinginvitations.com
              66.96.162.147
              truefalse
                unknown
                www.scaledsales.com
                unknown
                unknowntrue
                  unknown
                  www.fromthepittothepitts.com
                  unknown
                  unknowntrue
                    unknown
                    clientconfig.passport.net
                    unknown
                    unknowntrue
                      unknown

                      Contacted URLs

                      NameMaliciousAntivirus DetectionReputation
                      www.fromthepittothepitts.com/dwj/true
                      • Avira URL Cloud: safe
                      low
                      http://www.scaledsales.com/dwj/?Cj=lN985vvxrLh4&HTrLdvY=jCwgb33wmR2YDM1wuLgRTH38yeb9sMyK3XA0ZXE7/yU9OdwyZBI+RqEK8elpwbEptz+bfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fromthepittothepitts.com/dwj/?HTrLdvY=e+9w//LrkNQAvat7yjjfVebmP7O5RIC5nL700LrPx65Ls1GCtX2Cw2Ubn7E5A1TTieM1&Cj=lN985vvxrLh4true
                      • Avira URL Cloud: safe
                      unknown
                      http://www.timcrozier.com/dwj/?Cj=lN985vvxrLh4&HTrLdvY=vjdFX+deElwkJL3jjCyofcRGlviK7hY6fmHNPu6niYhLdTNZ+9C3ClVYQHWQZWwEwEGotrue
                      • Avira URL Cloud: safe
                      unknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.fontbureau.com/designersGPortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                        high
                        http://www.fontbureau.com/designers/?Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/bThePortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers?Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                            high
                            http://www.founder.com.cn/cnntePortfolio.exe, 00000000.00000003.230728863.0000000006454000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sajatypeworks.comif13Portfolio.exe, 00000000.00000003.228912347.000000000646B000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name4Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpfalse
                              high
                              http://www.tiro.comexplorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designersexplorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                high
                                http://www.goodfont.co.krPortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designersPPortfolio.exe, 00000000.00000003.233964245.0000000006459000.00000004.00000001.sdmpfalse
                                  high
                                  https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssPortfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cnormPortfolio.exe, 00000000.00000003.230728863.0000000006454000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.sajatypeworks.comPortfolio.exe, 00000000.00000003.228912347.000000000646B000.00000004.00000001.sdmp, Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.typography.netDPortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://en.wgPortfolio.exe, 00000000.00000003.228584223.0000000001B0D000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.founder.com.cn/cn/cThePortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/staff/dennis.htmPortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://fontfabrik.comPortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fonts.comicPortfolio.exe, 00000000.00000003.229044893.000000000646B000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fonts.com-uK2Portfolio.exe, 00000000.00000003.229070547.000000000646B000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/anaPortfolio.exe, 00000000.00000003.232390770.0000000006454000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.galapagosdesign.com/DPleasePortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fonts.comPortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.sandoll.co.krPortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sajatypeworks.comdPortfolio.exe, 00000000.00000003.228912347.000000000646B000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.urwpp.deDPleasePortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.zhongyicts.com.cnPortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePortfolio.exe, 00000000.00000002.249960275.0000000003421000.00000004.00000001.sdmp, Portfolio.exe, 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.sakkal.comPortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.apache.org/licenses/LICENSE-2.0Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                          high
                                          http://www.fontbureau.comPortfolio.exe, 00000000.00000002.255677929.0000000006450000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                            high
                                            http://www.fonts.comcPortfolio.exe, 00000000.00000003.229124720.000000000646B000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers8gPortfolio.exe, 00000000.00000003.234330110.000000000645D000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.jiyu-kobo.co.jp/ZpPortfolio.exe, 00000000.00000003.232390770.0000000006454000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.sandoll.co.krN.TTFPortfolio.exe, 00000000.00000003.230122037.0000000006459000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.sandoll.co.krs.Portfolio.exe, 00000000.00000003.230122037.0000000006459000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/jp/Portfolio.exe, 00000000.00000003.232390770.0000000006454000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/tp&Portfolio.exe, 00000000.00000003.232390770.0000000006454000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fontbureau.come.comPortfolio.exe, 00000000.00000002.255677929.0000000006450000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.carterandcone.comlPortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.founder.com.cn/cn/Portfolio.exe, 00000000.00000003.231020561.0000000006454000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/ipPortfolio.exe, 00000000.00000003.232390770.0000000006454000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fontbureau.com/designers/cabarga.htmlNPortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                                high
                                                http://www.founder.com.cn/cnPortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.com/designers/frere-jones.htmlPortfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                                  high
                                                  http://www.fonts.comFPortfolio.exe, 00000000.00000003.229070547.000000000646B000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp/Portfolio.exe, 00000000.00000003.232390770.0000000006454000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers8Portfolio.exe, 00000000.00000002.255795248.0000000006540000.00000002.00000001.sdmp, explorer.exe, 00000006.00000000.276691201.000000000BC30000.00000002.00000001.sdmpfalse
                                                    high
                                                    http://www.sandoll.co.kr0lPortfolio.exe, 00000000.00000003.230122037.0000000006459000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.tiro.comhPortfolio.exe, 00000000.00000003.229361711.000000000646B000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.tiro.comcPortfolio.exe, 00000000.00000003.229361711.000000000646B000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.founder.com.cn/cn/1Portfolio.exe, 00000000.00000003.231020561.0000000006454000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.founder.com.cn/cnFePortfolio.exe, 00000000.00000003.230728863.0000000006454000.00000004.00000001.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown

                                                    Contacted IPs

                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs

                                                    Public

                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    72.167.241.46
                                                    fromthepittothepitts.comUnited States
                                                    26496AS-26496-GO-DADDY-COM-LLCUStrue
                                                    34.102.136.180
                                                    scaledsales.comUnited States
                                                    15169GOOGLEUSfalse
                                                    168.206.243.213
                                                    www.timcrozier.comSouth Africa
                                                    137951CLAYERLIMITED-AS-APClayerLimitedHKtrue

                                                    General Information

                                                    Joe Sandbox Version:31.0.0 Emerald
                                                    Analysis ID:385265
                                                    Start date:12.04.2021
                                                    Start time:09:16:14
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 11m 2s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:light
                                                    Sample file name:Portfolio.exe
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                    Number of analysed new started processes analysed:29
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:1
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal100.troj.evad.winEXE@7/1@5/3
                                                    EGA Information:Failed
                                                    HDC Information:
                                                    • Successful, ratio: 6.4% (good quality ratio 5.6%)
                                                    • Quality average: 71.1%
                                                    • Quality standard deviation: 32.6%
                                                    HCA Information:
                                                    • Successful, ratio: 100%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Adjust boot time
                                                    • Enable AMSI
                                                    • Found application associated with file extension: .exe
                                                    Warnings:
                                                    Show All
                                                    • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                    • Excluded IPs from analysis (whitelisted): 93.184.220.29, 88.221.62.148, 204.79.197.200, 13.107.21.200, 92.123.150.225, 92.122.145.220, 13.88.21.125, 52.255.188.83, 184.30.20.56, 20.50.102.62, 52.147.198.201, 92.122.213.247, 92.122.213.194, 20.54.26.129
                                                    • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e11290.dspg.akamaiedge.net, e13551.dscg.akamaiedge.net, msagfx.live.com-6.edgekey.net, e12564.dspb.akamaiedge.net, authgfx.msa.akadns6.net, go.microsoft.com, ocsp.digicert.com, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, go.microsoft.com.edgekey.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                                    Simulations

                                                    Behavior and APIs

                                                    TimeTypeDescription
                                                    09:17:11API Interceptor1x Sleep call for process: Portfolio.exe modified

                                                    Joe Sandbox View / Context

                                                    IPs

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    72.167.241.46PURCHASE ORDER _675765000.exeGet hashmaliciousBrowse
                                                    • www.trebal-dev.com/boit/?k2MHoV=Ggwh2S5XlqD5vA3PM5hGj7QvI9b2kuXYTZe3tRUUW+yIJGQCtmpU8frTWQLsaFulbOHg&H0DpbV=zL3h7bmPUhx
                                                    New Order-756678 SEG.exeGet hashmaliciousBrowse
                                                    • www.trebal-dev.com/boit/?IbwLbh=jrQHqvKpqn4&MVc=Ggwh2S5XlqD5vA3PM5hGj7QvI9b2kuXYTZe3tRUUW+yIJGQCtmpU8frTWQLsaFulbOHg
                                                    probablyloki.exeGet hashmaliciousBrowse
                                                    • www.rapmu.com/wle/?q48=OurScjkzGM10DPuZZmhDUnYIpbTNr+NKkQ4VWTbl9vtjbvHdc8zmintMk10LNbqTHBeb&Un1l7=apa0hp7P3Z
                                                    123687197K13496L3.xlsmGet hashmaliciousBrowse
                                                    • 3queensacademy.com/kuxbng.gif
                                                    INV_187067244.docGet hashmaliciousBrowse
                                                    • deliverisrapido.com/hue73vl.gif

                                                    Domains

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    www.andersensweddinginvitations.comMT103_004758.exeGet hashmaliciousBrowse
                                                    • 66.96.162.147

                                                    ASN

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    CLAYERLIMITED-AS-APClayerLimitedHK36ne6xnkop.exeGet hashmaliciousBrowse
                                                    • 160.121.176.84
                                                    Wire Transfer Update.exeGet hashmaliciousBrowse
                                                    • 155.159.49.13
                                                    New order.exeGet hashmaliciousBrowse
                                                    • 155.159.49.22
                                                    Swift.exeGet hashmaliciousBrowse
                                                    • 164.88.176.186
                                                    DLVq1O2dUG.exeGet hashmaliciousBrowse
                                                    • 155.159.130.142
                                                    KL9fcbfrMB.exeGet hashmaliciousBrowse
                                                    • 160.121.176.84
                                                    New _Items.Xlsx.Pdf.exeGet hashmaliciousBrowse
                                                    • 155.159.49.38
                                                    1LHKlbcoW3.exeGet hashmaliciousBrowse
                                                    • 160.121.176.84
                                                    Product list.xlsxGet hashmaliciousBrowse
                                                    • 160.121.218.30
                                                    PO-108561.exeGet hashmaliciousBrowse
                                                    • 160.122.148.216
                                                    ZwNJI24QAf.exeGet hashmaliciousBrowse
                                                    • 160.121.176.84
                                                    pcBhOkLiD3.exeGet hashmaliciousBrowse
                                                    • 160.121.176.84
                                                    loMStbzHSP.exeGet hashmaliciousBrowse
                                                    • 160.121.176.84
                                                    PAYMENT_.exeGet hashmaliciousBrowse
                                                    • 160.121.177.117
                                                    Shipping Documents.exeGet hashmaliciousBrowse
                                                    • 160.122.148.213
                                                    Shipping Documents.exeGet hashmaliciousBrowse
                                                    • 168.206.218.50
                                                    PO_210316.exe.exeGet hashmaliciousBrowse
                                                    • 168.206.30.139
                                                    PO_20210310.exeGet hashmaliciousBrowse
                                                    • 168.206.56.51
                                                    PO # 5524792.exeGet hashmaliciousBrowse
                                                    • 164.88.178.142
                                                    i7DmAbXBCN.exeGet hashmaliciousBrowse
                                                    • 160.122.149.212
                                                    AS-26496-GO-DADDY-COM-LLCUS12042021493876783,xlsx.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    CIVIP-8287377.exeGet hashmaliciousBrowse
                                                    • 184.168.177.1
                                                    MT103_004758.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    Payment advice IN18663Q0031139I.xlsxGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    Swift002.exeGet hashmaliciousBrowse
                                                    • 50.62.160.230
                                                    36ne6xnkop.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    56UDmImzPe.dllGet hashmaliciousBrowse
                                                    • 107.180.90.10
                                                    Shipping doc&_B-Landen.exeGet hashmaliciousBrowse
                                                    • 50.62.137.41
                                                    Statement-ID261179932209970.vbsGet hashmaliciousBrowse
                                                    • 148.72.208.50
                                                    _.ryder.com._1602499153.666014.dllGet hashmaliciousBrowse
                                                    • 166.62.30.150
                                                    mW07jhVxX5.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    jEXf5uQ3DE.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    giATspz5dw.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    cV1uaQeOGg.exeGet hashmaliciousBrowse
                                                    • 107.180.50.167
                                                    documents-351331057.xlsmGet hashmaliciousBrowse
                                                    • 173.201.252.173
                                                    documents-351331057.xlsmGet hashmaliciousBrowse
                                                    • 173.201.252.173
                                                    documents-1819557117.xlsmGet hashmaliciousBrowse
                                                    • 173.201.252.173
                                                    documents-1819557117.xlsmGet hashmaliciousBrowse
                                                    • 173.201.252.173
                                                    aqbieGXkIX.docGet hashmaliciousBrowse
                                                    • 198.71.233.104
                                                    SwiftMT103.xlsxGet hashmaliciousBrowse
                                                    • 184.168.131.241

                                                    JA3 Fingerprints

                                                    No context

                                                    Dropped Files

                                                    No context

                                                    Created / dropped Files

                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Portfolio.exe.log
                                                    Process:C:\Users\user\Desktop\Portfolio.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1314
                                                    Entropy (8bit):5.350128552078965
                                                    Encrypted:false
                                                    SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                    MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                    SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                    SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                    SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                    Malicious:true
                                                    Reputation:high, very likely benign file
                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                                    Static File Info

                                                    General

                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Entropy (8bit):7.55999179720045
                                                    TrID:
                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                    • DOS Executable Generic (2002/1) 0.01%
                                                    File name:Portfolio.exe
                                                    File size:925696
                                                    MD5:9fa479c87543e7dd199296f7029991c9
                                                    SHA1:649bf55700b6828989dbcf4c5d792ba93fa5b2e0
                                                    SHA256:5cb8d74227cc43368e24ef8f94c5ae38a2f2c259a1701b1efa4f6b5042e4544d
                                                    SHA512:00487024f09ca717572408ed479f562e949396b99ada02496d51353dad7a602f42c27a9d87a6c2a4ad0c29cb884366e091d32221f7d572b4d2c3d33188e7ec27
                                                    SSDEEP:24576:LGuAeBVuO+r4mWRvxb58rvkYAm7bZxxpb:bAef+0hurMFiZJ
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....s`..............P.............b.... ........@.. .......................`............@................................

                                                    File Icon

                                                    Icon Hash:e8e8c4ccc4c4ecf8

                                                    Static PE Info

                                                    General

                                                    Entrypoint:0x4b9f62
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                    Time Stamp:0x60739AE1 [Mon Apr 12 00:57:05 2021 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:v4.0.30319
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                    Entrypoint Preview

                                                    Instruction
                                                    jmp dword ptr [00402000h]
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add al, 00h
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add al, 00h
                                                    add eax, dword ptr [eax]
                                                    add byte ptr [eax], al
                                                    xor byte ptr [eax], al
                                                    add byte ptr [eax+0000000Eh], al
                                                    mov byte ptr [eax], al
                                                    add byte ptr [eax+00000010h], al
                                                    mov al, byte ptr [18800000h]

                                                    Data Directories

                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb9f100x4f.text
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xba0000x29b6c.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xe40000xc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                    Sections

                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x20000xb7f680xb8000False0.955612846043data7.95191633624IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                    .rsrc0xba0000x29b6c0x29c00False0.126906343563data3.6950741891IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0xe40000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                    Resources

                                                    NameRVASizeTypeLanguageCountry
                                                    RT_ICON0xba2b00x1b1bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                    RT_ICON0xbbdcc0x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                                    RT_ICON0xcc5f40x94a8data
                                                    RT_ICON0xd5a9c0x5488data
                                                    RT_ICON0xdaf240x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 64767, next used block 4282318848
                                                    RT_ICON0xdf14c0x25a8data
                                                    RT_ICON0xe16f40x10a8data
                                                    RT_ICON0xe279c0x988data
                                                    RT_ICON0xe31240x468GLS_BINARY_LSB_FIRST
                                                    RT_GROUP_ICON0xe358c0x84data
                                                    RT_VERSION0xe36100x36edata
                                                    RT_MANIFEST0xe39800x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                    Imports

                                                    DLLImport
                                                    mscoree.dll_CorExeMain

                                                    Version Infos

                                                    DescriptionData
                                                    Translation0x0000 0x04b0
                                                    LegalCopyrightCopyright 2012
                                                    Assembly Version8.1.1.15
                                                    InternalNameSiteString.exe
                                                    FileVersion8.1.1.14
                                                    CompanyNameLandskip Yard Care
                                                    LegalTrademarksA++
                                                    Comments
                                                    ProductNameLevelActivator
                                                    ProductVersion8.1.1.14
                                                    FileDescriptionLevelActivator
                                                    OriginalFilenameSiteString.exe

                                                    Network Behavior

                                                    Snort IDS Alerts

                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                    04/12/21-09:18:56.354521TCP1201ATTACK-RESPONSES 403 Forbidden804972934.102.136.180192.168.2.5

                                                    Network Port Distribution

                                                    TCP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Apr 12, 2021 09:18:13.403533936 CEST4971880192.168.2.5168.206.243.213
                                                    Apr 12, 2021 09:18:13.702488899 CEST8049718168.206.243.213192.168.2.5
                                                    Apr 12, 2021 09:18:13.702672005 CEST4971880192.168.2.5168.206.243.213
                                                    Apr 12, 2021 09:18:14.225862980 CEST4971880192.168.2.5168.206.243.213
                                                    Apr 12, 2021 09:18:14.524841070 CEST8049718168.206.243.213192.168.2.5
                                                    Apr 12, 2021 09:18:14.542177916 CEST8049718168.206.243.213192.168.2.5
                                                    Apr 12, 2021 09:18:14.542432070 CEST4971880192.168.2.5168.206.243.213
                                                    Apr 12, 2021 09:18:14.773441076 CEST4971880192.168.2.5168.206.243.213
                                                    Apr 12, 2021 09:18:15.073348999 CEST8049718168.206.243.213192.168.2.5
                                                    Apr 12, 2021 09:18:35.118082047 CEST4972680192.168.2.572.167.241.46
                                                    Apr 12, 2021 09:18:35.302615881 CEST804972672.167.241.46192.168.2.5
                                                    Apr 12, 2021 09:18:35.302942991 CEST4972680192.168.2.572.167.241.46
                                                    Apr 12, 2021 09:18:35.303118944 CEST4972680192.168.2.572.167.241.46
                                                    Apr 12, 2021 09:18:35.528446913 CEST804972672.167.241.46192.168.2.5
                                                    Apr 12, 2021 09:18:35.793289900 CEST4972680192.168.2.572.167.241.46
                                                    Apr 12, 2021 09:18:35.979032040 CEST804972672.167.241.46192.168.2.5
                                                    Apr 12, 2021 09:18:35.979347944 CEST4972680192.168.2.572.167.241.46
                                                    Apr 12, 2021 09:18:56.174531937 CEST4972980192.168.2.534.102.136.180
                                                    Apr 12, 2021 09:18:56.217588902 CEST804972934.102.136.180192.168.2.5
                                                    Apr 12, 2021 09:18:56.217716932 CEST4972980192.168.2.534.102.136.180
                                                    Apr 12, 2021 09:18:56.217859983 CEST4972980192.168.2.534.102.136.180
                                                    Apr 12, 2021 09:18:56.258953094 CEST804972934.102.136.180192.168.2.5
                                                    Apr 12, 2021 09:18:56.354521036 CEST804972934.102.136.180192.168.2.5
                                                    Apr 12, 2021 09:18:56.354548931 CEST804972934.102.136.180192.168.2.5
                                                    Apr 12, 2021 09:18:56.354756117 CEST4972980192.168.2.534.102.136.180
                                                    Apr 12, 2021 09:18:56.357501030 CEST4972980192.168.2.534.102.136.180
                                                    Apr 12, 2021 09:18:56.399213076 CEST804972934.102.136.180192.168.2.5

                                                    UDP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Apr 12, 2021 09:16:56.719543934 CEST6530753192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:16:56.724289894 CEST53543028.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:16:56.741008043 CEST53537848.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:16:56.768624067 CEST53653078.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:16:56.996309042 CEST6434453192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:16:57.058957100 CEST53643448.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:16:59.871938944 CEST6206053192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:16:59.930143118 CEST53620608.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:03.261941910 CEST6180553192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:03.313592911 CEST53618058.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:04.442276955 CEST5479553192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:04.491070032 CEST53547958.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:05.688694954 CEST4955753192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:05.737376928 CEST53495578.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:07.316914082 CEST6173353192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:07.368558884 CEST53617338.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:08.595067978 CEST6544753192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:08.646498919 CEST53654478.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:09.392225981 CEST5244153192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:09.451770067 CEST53524418.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:11.835546970 CEST6217653192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:11.888118982 CEST53621768.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:16.299854040 CEST5959653192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:16.348552942 CEST53595968.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:23.526071072 CEST6529653192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:23.587982893 CEST53652968.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:34.194977999 CEST6318353192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:34.243963003 CEST53631838.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:34.615463972 CEST6015153192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:34.672692060 CEST53601518.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:37.051789045 CEST5696953192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:37.103430033 CEST53569698.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:45.247093916 CEST5516153192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:45.296128988 CEST53551618.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:17:48.020668030 CEST5475753192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:17:48.084284067 CEST53547578.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:18:13.175550938 CEST4999253192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:18:13.374707937 CEST53499928.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:18:19.340118885 CEST6007553192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:18:19.391705990 CEST53600758.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:18:24.494021893 CEST5501653192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:18:24.552732944 CEST53550168.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:18:35.042262077 CEST6434553192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:18:35.115943909 CEST53643458.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:18:42.661338091 CEST5712853192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:18:42.733763933 CEST53571288.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:18:55.673382044 CEST5479153192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:18:55.722364902 CEST53547918.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:18:55.992079020 CEST5046353192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:18:56.173592091 CEST53504638.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:18:57.861156940 CEST5039453192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:18:57.918423891 CEST53503948.8.8.8192.168.2.5
                                                    Apr 12, 2021 09:19:16.567157984 CEST5853053192.168.2.58.8.8.8
                                                    Apr 12, 2021 09:19:16.711580038 CEST53585308.8.8.8192.168.2.5

                                                    DNS Queries

                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                    Apr 12, 2021 09:16:56.996309042 CEST192.168.2.58.8.8.80x5e4cStandard query (0)clientconfig.passport.netA (IP address)IN (0x0001)
                                                    Apr 12, 2021 09:18:13.175550938 CEST192.168.2.58.8.8.80xc103Standard query (0)www.timcrozier.comA (IP address)IN (0x0001)
                                                    Apr 12, 2021 09:18:35.042262077 CEST192.168.2.58.8.8.80xf95dStandard query (0)www.fromthepittothepitts.comA (IP address)IN (0x0001)
                                                    Apr 12, 2021 09:18:55.992079020 CEST192.168.2.58.8.8.80x29cStandard query (0)www.scaledsales.comA (IP address)IN (0x0001)
                                                    Apr 12, 2021 09:19:16.567157984 CEST192.168.2.58.8.8.80x9ae8Standard query (0)www.andersensweddinginvitations.comA (IP address)IN (0x0001)

                                                    DNS Answers

                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                    Apr 12, 2021 09:16:57.058957100 CEST8.8.8.8192.168.2.50x5e4cNo error (0)clientconfig.passport.netauthgfx.msa.akadns6.netCNAME (Canonical name)IN (0x0001)
                                                    Apr 12, 2021 09:18:13.374707937 CEST8.8.8.8192.168.2.50xc103No error (0)www.timcrozier.com168.206.243.213A (IP address)IN (0x0001)
                                                    Apr 12, 2021 09:18:35.115943909 CEST8.8.8.8192.168.2.50xf95dNo error (0)www.fromthepittothepitts.comfromthepittothepitts.comCNAME (Canonical name)IN (0x0001)
                                                    Apr 12, 2021 09:18:35.115943909 CEST8.8.8.8192.168.2.50xf95dNo error (0)fromthepittothepitts.com72.167.241.46A (IP address)IN (0x0001)
                                                    Apr 12, 2021 09:18:56.173592091 CEST8.8.8.8192.168.2.50x29cNo error (0)www.scaledsales.comscaledsales.comCNAME (Canonical name)IN (0x0001)
                                                    Apr 12, 2021 09:18:56.173592091 CEST8.8.8.8192.168.2.50x29cNo error (0)scaledsales.com34.102.136.180A (IP address)IN (0x0001)
                                                    Apr 12, 2021 09:19:16.711580038 CEST8.8.8.8192.168.2.50x9ae8No error (0)www.andersensweddinginvitations.com66.96.162.147A (IP address)IN (0x0001)

                                                    HTTP Request Dependency Graph

                                                    • www.timcrozier.com
                                                    • www.fromthepittothepitts.com
                                                    • www.scaledsales.com

                                                    HTTP Packets

                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    0192.168.2.549718168.206.243.21380C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Apr 12, 2021 09:18:14.225862980 CEST1412OUTGET /dwj/?Cj=lN985vvxrLh4&HTrLdvY=vjdFX+deElwkJL3jjCyofcRGlviK7hY6fmHNPu6niYhLdTNZ+9C3ClVYQHWQZWwEwEGo HTTP/1.1
                                                    Host: www.timcrozier.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Apr 12, 2021 09:18:14.542177916 CEST1413INHTTP/1.1 404 Not Found
                                                    Server: nginx
                                                    Date: Mon, 12 Apr 2021 07:18:14 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 479
                                                    Connection: close
                                                    ETag: "5cf0c6a3-1df"
                                                    Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 6e 6f 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 3c 73 74 79 6c 65 3e 0a 09 62 6f 64 79 7b 0a 09 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 34 34 34 3b 0a 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 31 34 70 78 3b 0a 09 7d 0a 09 68 33 7b 0a 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 36 30 70 78 3b 0a 09 09 63 6f 6c 6f 72 3a 23 65 65 65 3b 0a 09 09 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 0a 09 09 70 61 64 64 69 6e 67 2d 74 6f 70 3a 33 30 70 78 3b 0a 09 09 66 6f 6e 74 2d 77 65 69 67 68 74 3a 6e 6f 72 6d 61 6c 3b 0a 09 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 0a 3c 62 6f 64 79 3e 0a 3c 68 33 3e 34 30 34 ef bc 8c e6 82 a8 e8 af b7 e6 b1 82 e7 9a 84 e6 96 87 e4 bb b6 e4 b8 8d e5 ad 98 e5 9c a8 21 3c 2f 68 33 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!doctype html><html><head><meta charset="utf-8"><meta http-equiv="X-UA-Compatible" content="IE=edge"><meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1, user-scalable=no"><title>404</title><style>body{background-color:#444;font-size:14px;}h3{font-size:60px;color:#eee;text-align:center;padding-top:30px;font-weight:normal;}</style></head><body><h3>404!</h3></body></html>


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    1192.168.2.54972672.167.241.4680C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Apr 12, 2021 09:18:35.303118944 CEST4761OUTGET /dwj/?HTrLdvY=e+9w//LrkNQAvat7yjjfVebmP7O5RIC5nL700LrPx65Ls1GCtX2Cw2Ubn7E5A1TTieM1&Cj=lN985vvxrLh4 HTTP/1.1
                                                    Host: www.fromthepittothepitts.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Apr 12, 2021 09:18:35.979032040 CEST4762INHTTP/1.0 400 Bad request
                                                    Cache-Control: no-cache
                                                    Connection: close
                                                    Content-Type: text/html
                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 72 65 71 75 65 73 74 3c 2f 68 31 3e 0a 59 6f 75 72 20 62 72 6f 77 73 65 72 20 73 65 6e 74 20 61 6e 20 69 6e 76 61 6c 69 64 20 72 65 71 75 65 73 74 2e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <html><body><h1>400 Bad request</h1>Your browser sent an invalid request.</body></html>


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    2192.168.2.54972934.102.136.18080C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Apr 12, 2021 09:18:56.217859983 CEST4804OUTGET /dwj/?Cj=lN985vvxrLh4&HTrLdvY=jCwgb33wmR2YDM1wuLgRTH38yeb9sMyK3XA0ZXE7/yU9OdwyZBI+RqEK8elpwbEptz+b HTTP/1.1
                                                    Host: www.scaledsales.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Apr 12, 2021 09:18:56.354521036 CEST4805INHTTP/1.1 403 Forbidden
                                                    Server: openresty
                                                    Date: Mon, 12 Apr 2021 07:18:56 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 275
                                                    ETag: "60737c38-113"
                                                    Via: 1.1 google
                                                    Connection: close
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                                    Code Manipulations

                                                    User Modules

                                                    Hook Summary

                                                    Function NameHook TypeActive in Processes
                                                    PeekMessageAINLINEexplorer.exe
                                                    PeekMessageWINLINEexplorer.exe
                                                    GetMessageWINLINEexplorer.exe
                                                    GetMessageAINLINEexplorer.exe

                                                    Processes

                                                    Process: explorer.exe, Module: user32.dll
                                                    Function NameHook TypeNew Data
                                                    PeekMessageAINLINE0x48 0x8B 0xB8 0x8C 0xCE 0xE1
                                                    PeekMessageWINLINE0x48 0x8B 0xB8 0x84 0x4E 0xE1
                                                    GetMessageWINLINE0x48 0x8B 0xB8 0x84 0x4E 0xE1
                                                    GetMessageAINLINE0x48 0x8B 0xB8 0x8C 0xCE 0xE1

                                                    Statistics

                                                    Behavior

                                                    Click to jump to process

                                                    System Behavior

                                                    General

                                                    Start time:09:17:04
                                                    Start date:12/04/2021
                                                    Path:C:\Users\user\Desktop\Portfolio.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:'C:\Users\user\Desktop\Portfolio.exe'
                                                    Imagebase:0xfd0000
                                                    File size:925696 bytes
                                                    MD5 hash:9FA479C87543E7DD199296F7029991C9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.252926038.00000000045D5000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.252926038.00000000045D5000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.252926038.00000000045D5000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.250046779.0000000003476000.00000004.00000001.sdmp, Author: Joe Security
                                                    Reputation:low

                                                    General

                                                    Start time:09:17:13
                                                    Start date:12/04/2021
                                                    Path:C:\Users\user\Desktop\Portfolio.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\Desktop\Portfolio.exe
                                                    Imagebase:0xda0000
                                                    File size:925696 bytes
                                                    MD5 hash:9FA479C87543E7DD199296F7029991C9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.294841079.0000000001620000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.293921450.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.293921450.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.293921450.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.294742769.00000000015F0000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.294742769.00000000015F0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.294742769.00000000015F0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:low

                                                    General

                                                    Start time:09:17:16
                                                    Start date:12/04/2021
                                                    Path:C:\Windows\explorer.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:
                                                    Imagebase:0x7ff693d90000
                                                    File size:3933184 bytes
                                                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:09:17:33
                                                    Start date:12/04/2021
                                                    Path:C:\Windows\SysWOW64\mstsc.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\mstsc.exe
                                                    Imagebase:0xc70000
                                                    File size:3444224 bytes
                                                    MD5 hash:2412003BE253A515C620CE4890F3D8F3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000E.00000002.501446234.0000000004E40000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000E.00000002.501446234.0000000004E40000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000E.00000002.501446234.0000000004E40000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000E.00000002.500122632.0000000003030000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000E.00000002.500122632.0000000003030000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000E.00000002.500122632.0000000003030000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000E.00000002.501316678.0000000004E10000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000E.00000002.501316678.0000000004E10000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000E.00000002.501316678.0000000004E10000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:moderate

                                                    General

                                                    Start time:09:17:37
                                                    Start date:12/04/2021
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:/c del 'C:\Users\user\Desktop\Portfolio.exe'
                                                    Imagebase:0x30000
                                                    File size:232960 bytes
                                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:09:17:37
                                                    Start date:12/04/2021
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7ecfc0000
                                                    File size:625664 bytes
                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    Disassembly

                                                    Code Analysis

                                                    Reset < >