Loading ...

Play interactive tourEdit tour

Analysis Report ORDDER-238486-LBT.exe

Overview

General Information

Sample Name:ORDDER-238486-LBT.exe
Analysis ID:385266
MD5:d320967a90e6a8fd824864c53dc02135
SHA1:345e589b268690d6a3f34686cdd0af5368de376c
SHA256:6e110b6474993b690f1bf6f2edc01446010ce9bef5375991693e2bffa81d14fd
Tags:exeFormbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected FormBook
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • ORDDER-238486-LBT.exe (PID: 1844 cmdline: 'C:\Users\user\Desktop\ORDDER-238486-LBT.exe' MD5: D320967A90E6A8FD824864C53DC02135)
    • schtasks.exe (PID: 5788 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CqbqIOaf' /XML 'C:\Users\user\AppData\Local\Temp\tmp1DD1.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • ORDDER-238486-LBT.exe (PID: 5524 cmdline: C:\Users\user\Desktop\ORDDER-238486-LBT.exe MD5: D320967A90E6A8FD824864C53DC02135)
      • explorer.exe (PID: 3388 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • chkdsk.exe (PID: 6928 cmdline: C:\Windows\SysWOW64\chkdsk.exe MD5: 2D5A2497CB57C374B3AE3080FF9186FB)
          • cmd.exe (PID: 7072 cmdline: /c del 'C:\Users\user\Desktop\ORDDER-238486-LBT.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 7092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.valoremamma.com/cw3g/"], "decoy": ["qiuxi.ltd", "kylayagerartwork.com", "qzgay.com", "riverandroadfilms.com", "easislip.com", "ma3loomat.info", "babyuniverses.com", "ovvldbxmd.icu", "fthiscompany.com", "tabac-control.com", "x7exf2.com", "juxrams.info", "californialaserspinesurgery.com", "theindielawyer.com", "jxaotu.com", "epostakutun.com", "pappyjackburgershack.com", "fgafinancialgroup.com", "ddiesels.com", "thesixthdesign.com", "dunesrealtygroup.com", "thorntonhillshousecleaning.com", "xmgzj.com", "np9co.com", "sumerueduneed.com", "harveyvargas.com", "dpriew.com", "mama-hochet-seksa.site", "theforbiddentoybox.com", "manhassetcarwash.com", "dailyhealthyvibes.info", "flutterlashestoronto.com", "echelonfurniture.com", "moukarram.com", "burateamtr.net", "psicobiologiadelser.com", "theleave.club", "texasapartmentinvestorclub.com", "yul2.com", "peixotoepeixotos.com", "neflcounseling.com", "awatabi.com", "goodpractiz.com", "smileworkscorp.com", "oreshola.com", "xn--m3ciavumc0b2aba4gwjkb9e.com", "20dzb.com", "lovvlens.com", "awesomequery.com", "sohailacollection.com", "westglobaladvisors.com", "virginiaelderlawattorney.com", "sabariindustries.com", "ownyourmoan.com", "cricybuzz.com", "sapxml.com", "tndhaulingllc.com", "hrzqjd.com", "ortholasercenter.com", "suzukisunter.com", "geduvinware.com", "japmenthe.com", "pgdump.guru", "couplesofhouston.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b4f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c4fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18419:$sqlite3step: 68 34 1C 7B E1
      • 0x1852c:$sqlite3step: 68 34 1C 7B E1
      • 0x18448:$sqlite3text: 68 38 2A 90 C5
      • 0x1856d:$sqlite3text: 68 38 2A 90 C5
      • 0x1845b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x18583:$sqlite3blob: 68 53 D8 7F 8C
      00000001.00000002.262648767.0000000002753000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Click to see the 16 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        9.2.ORDDER-238486-LBT.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          9.2.ORDDER-238486-LBT.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b4f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c4fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          9.2.ORDDER-238486-LBT.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x18419:$sqlite3step: 68 34 1C 7B E1
          • 0x1852c:$sqlite3step: 68 34 1C 7B E1
          • 0x18448:$sqlite3text: 68 38 2A 90 C5
          • 0x1856d:$sqlite3text: 68 38 2A 90 C5
          • 0x1845b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x18583:$sqlite3blob: 68 53 D8 7F 8C
          9.2.ORDDER-238486-LBT.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
            9.2.ORDDER-238486-LBT.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
            • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x8d62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x14885:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
            • 0x14371:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
            • 0x14987:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
            • 0x14aff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
            • 0x977a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
            • 0x135ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
            • 0xa473:$sequence_7: 66 89 0C 02 5B 8B E5 5D
            • 0x1a6f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
            • 0x1b6fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
            Click to see the 2 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: Scheduled temp file as task from temp locationShow sources
            Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CqbqIOaf' /XML 'C:\Users\user\AppData\Local\Temp\tmp1DD1.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CqbqIOaf' /XML 'C:\Users\user\AppData\Local\Temp\tmp1DD1.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\ORDDER-238486-LBT.exe' , ParentImage: C:\Users\user\Desktop\ORDDER-238486-LBT.exe, ParentProcessId: 1844, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CqbqIOaf' /XML 'C:\Users\user\AppData\Local\Temp\tmp1DD1.tmp', ProcessId: 5788

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.valoremamma.com/cw3g/"], "decoy": ["qiuxi.ltd", "kylayagerartwork.com", "qzgay.com", "riverandroadfilms.com", "easislip.com", "ma3loomat.info", "babyuniverses.com", "ovvldbxmd.icu", "fthiscompany.com", "tabac-control.com", "x7exf2.com", "juxrams.info", "californialaserspinesurgery.com", "theindielawyer.com", "jxaotu.com", "epostakutun.com", "pappyjackburgershack.com", "fgafinancialgroup.com", "ddiesels.com", "thesixthdesign.com", "dunesrealtygroup.com", "thorntonhillshousecleaning.com", "xmgzj.com", "np9co.com", "sumerueduneed.com", "harveyvargas.com", "dpriew.com", "mama-hochet-seksa.site", "theforbiddentoybox.com", "manhassetcarwash.com", "dailyhealthyvibes.info", "flutterlashestoronto.com", "echelonfurniture.com", "moukarram.com", "burateamtr.net", "psicobiologiadelser.com", "theleave.club", "texasapartmentinvestorclub.com", "yul2.com", "peixotoepeixotos.com", "neflcounseling.com", "awatabi.com", "goodpractiz.com", "smileworkscorp.com", "oreshola.com", "xn--m3ciavumc0b2aba4gwjkb9e.com", "20dzb.com", "lovvlens.com", "awesomequery.com", "sohailacollection.com", "westglobaladvisors.com", "virginiaelderlawattorney.com", "sabariindustries.com", "ownyourmoan.com", "cricybuzz.com", "sapxml.com", "tndhaulingllc.com", "hrzqjd.com", "ortholasercenter.com", "suzukisunter.com", "geduvinware.com", "japmenthe.com", "pgdump.guru", "couplesofhouston.com"]}
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Roaming\CqbqIOaf.exeReversingLabs: Detection: 12%
            Multi AV Scanner detection for submitted fileShow sources
            Source: ORDDER-238486-LBT.exeVirustotal: Detection: 34%Perma Link
            Source: ORDDER-238486-LBT.exeReversingLabs: Detection: 12%
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.312289231.0000000000FA0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.263822373.00000000038AE000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.311502162.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.482249275.0000000000310000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.313250588.0000000001300000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 9.2.ORDDER-238486-LBT.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.ORDDER-238486-LBT.exe.400000.0.unpack, type: UNPACKEDPE
            Machine Learning detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Roaming\CqbqIOaf.exeJoe Sandbox ML: detected
            Machine Learning detection for sampleShow sources
            Source: ORDDER-238486-LBT.exeJoe Sandbox ML: detected
            Source: 9.2.ORDDER-238486-LBT.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: ORDDER-238486-LBT.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: ORDDER-238486-LBT.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: chkdsk.pdbGCTL source: ORDDER-238486-LBT.exe, 00000009.00000002.313395898.0000000001360000.00000040.00000001.sdmp
            Source: Binary string: wscui.pdbUGP source: explorer.exe, 0000000A.00000000.295541950.000000000E340000.00000002.00000001.sdmp
            Source: Binary string: chkdsk.pdb source: ORDDER-238486-LBT.exe, 00000009.00000002.313395898.0000000001360000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdbUGP source: ORDDER-238486-LBT.exe, 00000009.00000003.260762668.0000000000CA0000.00000004.00000001.sdmp, chkdsk.exe, 00000015.00000002.485799672.0000000004E9F000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdb source: ORDDER-238486-LBT.exe, 00000009.00000003.260762668.0000000000CA0000.00000004.00000001.sdmp, chkdsk.exe
            Source: Binary string: wscui.pdb source: explorer.exe, 0000000A.00000000.295541950.000000000E340000.00000002.00000001.sdmp
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 4x nop then pop edi
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4x nop then pop edi

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: www.valoremamma.com/cw3g/
            Source: unknownDNS traffic detected: query: www.tndhaulingllc.com replaycode: Name error (3)
            Source: unknownDNS traffic detected: query: www.dailyhealthyvibes.info replaycode: Name error (3)
            Source: unknownDNS traffic detected: queries for: www.dailyhealthyvibes.info
            Source: explorer.exe, 0000000A.00000000.292278972.00000000089B9000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmp, ORDDER-238486-LBT.exe, 00000001.00000002.262667212.0000000002767000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262667212.0000000002767000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name4
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.221221240.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.agfamonotype.L
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.221179983.00000000056D6000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.221221240.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.htmlj
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/
            Source: explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.222445271.00000000056CE000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/de#6cN
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.222863618.00000000056A8000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmlr-f
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com1
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comals
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalsF
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.227367591.0000000005697000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.come.com
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.227367591.0000000005697000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comicta#
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comy
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.217069141.0000000005698000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.217069141.0000000005698000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.216897543.0000000005697000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn_
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.216700983.000000000569E000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnia
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.216737907.00000000009FD000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnj
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.216897543.0000000005697000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnw
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.225079564.00000000056A3000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/.
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, ORDDER-238486-LBT.exe, 00000001.00000003.225337772.00000000056A4000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.220484294.0000000005695000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.220484294.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/H
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.220484294.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.220484294.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.220484294.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/va
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.220484294.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/vno
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, ORDDER-238486-LBT.exe, 00000001.00000003.214609146.0000000005693000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.214609146.0000000005693000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.coma
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.214609146.0000000005693000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.come
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.221221240.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.comm
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css

            E-Banking Fraud:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.312289231.0000000000FA0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.263822373.00000000038AE000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.311502162.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.482249275.0000000000310000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.313250588.0000000001300000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 9.2.ORDDER-238486-LBT.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.ORDDER-238486-LBT.exe.400000.0.unpack, type: UNPACKEDPE

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000009.00000002.312289231.0000000000FA0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000009.00000002.312289231.0000000000FA0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.263822373.00000000038AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000001.00000002.263822373.00000000038AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000009.00000002.311502162.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000009.00000002.311502162.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000015.00000002.482249275.0000000000310000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000015.00000002.482249275.0000000000310000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000009.00000002.313250588.0000000001300000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000009.00000002.313250588.0000000001300000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 9.2.ORDDER-238486-LBT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 9.2.ORDDER-238486-LBT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 9.2.ORDDER-238486-LBT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 9.2.ORDDER-238486-LBT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0041A060 NtClose,
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0041A110 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_00419F30 NtCreateFile,
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_00419FE0 NtReadFile,
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0041A10A NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_00419F2E NtCreateFile,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE95D0 NtClose,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9540 NtReadFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE96D0 NtCreateKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE96E0 NtFreeVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9650 NtQueryValueKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9660 NtAllocateVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9FE0 NtCreateMutant,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9780 NtMapViewOfSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9710 NtQueryInformationToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9840 NtDelayExecution,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9860 NtQuerySystemInformation,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE99A0 NtCreateSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9A50 NtCreateFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE95F0 NtQueryInformationFile,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9560 NtWriteFile,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DEAD30 NtSetContextThread,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9520 NtWaitForSingleObject,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9670 NtQueryInformationProcess,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9610 NtEnumerateValueKey,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE97A0 NtUnmapViewOfSection,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DEA770 NtOpenThread,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9770 NtSetInformationFile,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9760 NtOpenProcess,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DEA710 NtOpenProcessToken,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9730 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE98F0 NtReadVirtualMemory,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE98A0 NtWriteVirtualMemory,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DEB040 NtSuspendThread,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9820 NtEnumerateKey,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE99D0 NtCreateProcessEx,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9950 NtQueueApcThread,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9A80 NtOpenDirectoryObject,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9A10 NtQuerySection,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9A00 NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9A20 NtResumeThread,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DEA3B0 NtGetContextThread,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE9B00 NtSetValueKey,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04729F30 NtCreateFile,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04729FE0 NtReadFile,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_0472A060 NtClose,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_0472A110 NtAllocateVirtualMemory,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04729F2E NtCreateFile,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_0472A10A NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_00A0C2B0
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_00A09968
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B0040
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B38B0
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B3FC0
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B45D8
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B02D2
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B02E0
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B53B7
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B0006
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B5021
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B38A0
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B495F
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B4960
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B5614
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B3FBF
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B8450
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B1518
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B1509
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B45C9
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B5591
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B4581
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_0517FC00
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_0517C528
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_00202050
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_00401030
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0041D176
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0041E234
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0041EB2E
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0041DC4C
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0041E4A0
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_00402D87
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_00402D90
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_00409E40
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_00402FB0
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6D466
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB841F
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E725DD
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DBD5E0
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD2581
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E71D55
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E72D07
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA0D20
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E72EF7
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DC6E30
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6D616
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E71FF1
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E7DFCE
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E728EC
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DBB090
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E720A8
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD20A0
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E7E824
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61002
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAF900
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DC4120
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E722AE
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6DBD2
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E603DA
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDEBB0
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E72B28
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_0472DC4C
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_0472E4A0
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04712D90
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04712D87
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04719E40
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04712FB0
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_0472D176
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_0472E234
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_0472EB2E
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: String function: 04DAB150 appears 39 times
            Source: ORDDER-238486-LBT.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: CqbqIOaf.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: ORDDER-238486-LBT.exeBinary or memory string: OriginalFilename vs ORDDER-238486-LBT.exe
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.271896465.000000000D2A0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs ORDDER-238486-LBT.exe
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.271896465.000000000D2A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs ORDDER-238486-LBT.exe
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll2 vs ORDDER-238486-LBT.exe
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.271697157.000000000D1A0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs ORDDER-238486-LBT.exe
            Source: ORDDER-238486-LBT.exe, 00000001.00000003.233398612.000000000C9B1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameComparisonResult.exe> vs ORDDER-238486-LBT.exe
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.269210126.0000000007030000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll" vs ORDDER-238486-LBT.exe
            Source: ORDDER-238486-LBT.exeBinary or memory string: OriginalFilename vs ORDDER-238486-LBT.exe
            Source: ORDDER-238486-LBT.exe, 00000009.00000002.312886293.000000000127F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ORDDER-238486-LBT.exe
            Source: ORDDER-238486-LBT.exe, 00000009.00000000.260034773.0000000000542000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameComparisonResult.exe> vs ORDDER-238486-LBT.exe
            Source: ORDDER-238486-LBT.exe, 00000009.00000002.313423844.0000000001366000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameCHKDSK.EXEj% vs ORDDER-238486-LBT.exe
            Source: ORDDER-238486-LBT.exeBinary or memory string: OriginalFilenameComparisonResult.exe> vs ORDDER-238486-LBT.exe
            Source: ORDDER-238486-LBT.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: 00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000009.00000002.312289231.0000000000FA0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000009.00000002.312289231.0000000000FA0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000001.00000002.263822373.00000000038AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000001.00000002.263822373.00000000038AE000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000009.00000002.311502162.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000009.00000002.311502162.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000015.00000002.482249275.0000000000310000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000015.00000002.482249275.0000000000310000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000009.00000002.313250588.0000000001300000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000009.00000002.313250588.0000000001300000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 9.2.ORDDER-238486-LBT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 9.2.ORDDER-238486-LBT.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 9.2.ORDDER-238486-LBT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 9.2.ORDDER-238486-LBT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: ORDDER-238486-LBT.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: CqbqIOaf.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal100.troj.evad.winEXE@10/4@2/0
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeFile created: C:\Users\user\AppData\Roaming\CqbqIOaf.exeJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5924:120:WilError_01
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7092:120:WilError_01
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeFile created: C:\Users\user\AppData\Local\Temp\tmp1DD1.tmpJump to behavior
            Source: ORDDER-238486-LBT.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: Select * from UnmanagedMemoryStreamWrapper WHERE modelo=@modelo;?
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel5Erro ao listar Banco sql-UnmanagedMemoryStreamWrapper.INSERT INTO Aluguel VALUES(@clienteID, @data);
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: INSERT INTO UnmanagedMemoryStreamWrapper VALUES(@modelo, @fabricante, @ano, @cor);
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
            Source: ORDDER-238486-LBT.exeVirustotal: Detection: 34%
            Source: ORDDER-238486-LBT.exeReversingLabs: Detection: 12%
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeFile read: C:\Users\user\Desktop\ORDDER-238486-LBT.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\ORDDER-238486-LBT.exe 'C:\Users\user\Desktop\ORDDER-238486-LBT.exe'
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CqbqIOaf' /XML 'C:\Users\user\AppData\Local\Temp\tmp1DD1.tmp'
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess created: C:\Users\user\Desktop\ORDDER-238486-LBT.exe C:\Users\user\Desktop\ORDDER-238486-LBT.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\chkdsk.exe C:\Windows\SysWOW64\chkdsk.exe
            Source: C:\Windows\SysWOW64\chkdsk.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\ORDDER-238486-LBT.exe'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CqbqIOaf' /XML 'C:\Users\user\AppData\Local\Temp\tmp1DD1.tmp'
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess created: C:\Users\user\Desktop\ORDDER-238486-LBT.exe C:\Users\user\Desktop\ORDDER-238486-LBT.exe
            Source: C:\Windows\SysWOW64\chkdsk.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\ORDDER-238486-LBT.exe'
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: ORDDER-238486-LBT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: ORDDER-238486-LBT.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: chkdsk.pdbGCTL source: ORDDER-238486-LBT.exe, 00000009.00000002.313395898.0000000001360000.00000040.00000001.sdmp
            Source: Binary string: wscui.pdbUGP source: explorer.exe, 0000000A.00000000.295541950.000000000E340000.00000002.00000001.sdmp
            Source: Binary string: chkdsk.pdb source: ORDDER-238486-LBT.exe, 00000009.00000002.313395898.0000000001360000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdbUGP source: ORDDER-238486-LBT.exe, 00000009.00000003.260762668.0000000000CA0000.00000004.00000001.sdmp, chkdsk.exe, 00000015.00000002.485799672.0000000004E9F000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdb source: ORDDER-238486-LBT.exe, 00000009.00000003.260762668.0000000000CA0000.00000004.00000001.sdmp, chkdsk.exe
            Source: Binary string: wscui.pdb source: explorer.exe, 0000000A.00000000.295541950.000000000E340000.00000002.00000001.sdmp
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 1_2_025B0895 push 00000037h; iretd
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0041D0D2 push eax; ret
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0041D0DB push eax; ret
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0041D085 push eax; ret
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0041D13C push eax; ret
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_004169B0 push eax; iretd
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0041BDAD push edx; retf
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DFD0D1 push ecx; ret
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_0472BDAD push edx; retf
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_0472D0D2 push eax; ret
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_0472D0DB push eax; ret
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_0472D085 push eax; ret
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_0472D13C push eax; ret
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_047269B0 push eax; iretd
            Source: initial sampleStatic PE information: section name: .text entropy: 7.95061413978
            Source: initial sampleStatic PE information: section name: .text entropy: 7.95061413978
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeFile created: C:\Users\user\AppData\Roaming\CqbqIOaf.exeJump to dropped file

            Boot Survival:

            barindex
            Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CqbqIOaf' /XML 'C:\Users\user\AppData\Local\Temp\tmp1DD1.tmp'

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Modifies the prolog of user mode functions (user mode inline hooks)Show sources
            Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8B 0xBE 0xE6
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\chkdsk.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM3Show sources
            Source: Yara matchFile source: 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.262648767.0000000002753000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: ORDDER-238486-LBT.exe PID: 1844, type: MEMORY
            Source: Yara matchFile source: 1.2.ORDDER-238486-LBT.exe.272d63c.1.raw.unpack, type: UNPACKEDPE
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\chkdsk.exeRDTSC instruction interceptor: First address: 00000000047198E4 second address: 00000000047198EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\chkdsk.exeRDTSC instruction interceptor: First address: 0000000004719B5E second address: 0000000004719B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_00409A90 rdtsc
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exe TID: 1956Thread sleep time: -104611s >= -30000s
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exe TID: 4856Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\explorer.exe TID: 3508Thread sleep time: -50000s >= -30000s
            Source: C:\Windows\SysWOW64\chkdsk.exe TID: 204Thread sleep time: -32000s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\chkdsk.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeThread delayed: delay time: 104611
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeThread delayed: delay time: 922337203685477
            Source: explorer.exe, 0000000A.00000000.291363948.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
            Source: explorer.exe, 0000000A.00000000.291363948.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000:
            Source: explorer.exe, 0000000A.00000000.291010669.0000000008640000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 0000000A.00000000.290352855.0000000008220000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
            Source: explorer.exe, 0000000A.00000002.498634597.00000000055D0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}V*(E
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: VMWARE
            Source: explorer.exe, 0000000A.00000000.291363948.000000000871F000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}~
            Source: explorer.exe, 0000000A.00000000.291363948.000000000871F000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
            Source: explorer.exe, 0000000A.00000000.291535281.00000000087D1000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00ices
            Source: explorer.exe, 0000000A.00000000.278520005.0000000005603000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: explorer.exe, 0000000A.00000002.497135241.0000000004DF3000.00000004.00000001.sdmpBinary or memory string: #{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATAL
            Source: explorer.exe, 0000000A.00000000.290352855.0000000008220000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: explorer.exe, 0000000A.00000000.277439986.0000000004E61000.00000004.00000001.sdmpBinary or memory string: War&Prod_VMware_SATA_CD00#5&w
            Source: explorer.exe, 0000000A.00000000.290352855.0000000008220000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
            Source: ORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
            Source: explorer.exe, 0000000A.00000000.290352855.0000000008220000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\chkdsk.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_00409A90 rdtsc
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeCode function: 9_2_0040ACD0 LdrLoadDll,
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E26CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E26CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E26CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E614FB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E78CD6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB849B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDA44B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DC746D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E3C450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E3C450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E26C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E26C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E26C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E26C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E7740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E7740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E7740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDBC2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E58DF1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E26DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E26DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E26DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E26DC9 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E26DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E26DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DBD5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DBD5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDFD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDFD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E705AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E705AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA2D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD2581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD2581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD2581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD2581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD1DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD1DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD1DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD35A1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DC7D50 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE3D43 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E23540 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DCC577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DCC577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E78D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E2A537 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6E539 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD4D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD4D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD4D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAAD30 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD36CC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE8EC7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E5FEC0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E78ED6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB76E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD16E0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E70EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E70EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E70EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E246A7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E3FE87 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6AE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6AE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DCAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DCAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DCAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DCAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DCAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB766D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDA61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDA61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E5FE3F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAC600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD8E00 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E61608 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAE620 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE37F5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB8794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E27794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E27794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E27794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E78F6A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DBEF40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DBFF60 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DCF716 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDA70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDA70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E7070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E7070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDE730 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E3FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E3FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA4F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA4F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E3B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E3B8D0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E3B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E3B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E3B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E3B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA58EC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA40E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA40E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA40E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA9080 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDF0BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDF0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDF0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E23884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E23884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE90AF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DC0050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DC0050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E71074 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E62073 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DBB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DBB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DBB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DBB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E74015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E74015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E27016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E27016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E27016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E341E8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAB1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E269A6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD2990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDA185 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E251BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E251BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E251BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E251BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DCC182 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD61A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD61A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DCB944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DCB944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAB171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAB171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAC962 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA9100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DC4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DC4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DC4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DC4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DC4120 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD2ACB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD2AE4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDD294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDD294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DBAAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DBAAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDFAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA52A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E78A62 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E5B260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E5B260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA9240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE927A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6EA55 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E34257 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DC3A1C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA5210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA5210 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA5210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DA5210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB8A0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE4A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DE4A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E253CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E253CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DCDBE9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD03E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD03E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD03E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD03E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD03E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD03E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E75BA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD2397 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DDB390 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB1B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DB1B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E5D380 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6138A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD4BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD4BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD4BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DAF358 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DADB40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD3B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DD3B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04DADB60 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E78B58 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 21_2_04E6131B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\chkdsk.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            System process connects to network (likely due to code injection or exploit)Show sources
            Source: C:\Windows\explorer.exeDomain query: www.dailyhealthyvibes.info
            Injects a PE file into a foreign processesShow sources
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeMemory written: C:\Users\user\Desktop\ORDDER-238486-LBT.exe base: 400000 value starts with: 4D5A
            Maps a DLL or memory area into another processShow sources
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeSection loaded: unknown target: C:\Windows\SysWOW64\chkdsk.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeSection loaded: unknown target: C:\Windows\SysWOW64\chkdsk.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\chkdsk.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
            Source: C:\Windows\SysWOW64\chkdsk.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Modifies the context of a thread in another process (thread injection)Show sources
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeThread register set: target process: 3388
            Source: C:\Windows\SysWOW64\chkdsk.exeThread register set: target process: 3388
            Queues an APC in another process (thread injection)Show sources
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeThread APC queued: target process: C:\Windows\explorer.exe
            Sample uses process hollowing techniqueShow sources
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeSection unmapped: C:\Windows\SysWOW64\chkdsk.exe base address: 190000
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CqbqIOaf' /XML 'C:\Users\user\AppData\Local\Temp\tmp1DD1.tmp'
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeProcess created: C:\Users\user\Desktop\ORDDER-238486-LBT.exe C:\Users\user\Desktop\ORDDER-238486-LBT.exe
            Source: C:\Windows\SysWOW64\chkdsk.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\ORDDER-238486-LBT.exe'
            Source: explorer.exe, 0000000A.00000002.482184242.0000000001398000.00000004.00000020.sdmpBinary or memory string: ProgmanamF
            Source: explorer.exe, 0000000A.00000002.484549649.0000000001980000.00000002.00000001.sdmp, chkdsk.exe, 00000015.00000002.488620345.0000000006290000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: explorer.exe, 0000000A.00000002.484549649.0000000001980000.00000002.00000001.sdmp, chkdsk.exe, 00000015.00000002.488620345.0000000006290000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 0000000A.00000002.484549649.0000000001980000.00000002.00000001.sdmp, chkdsk.exe, 00000015.00000002.488620345.0000000006290000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: explorer.exe, 0000000A.00000002.484549649.0000000001980000.00000002.00000001.sdmp, chkdsk.exe, 00000015.00000002.488620345.0000000006290000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Users\user\Desktop\ORDDER-238486-LBT.exe VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\ORDDER-238486-LBT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.312289231.0000000000FA0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.263822373.00000000038AE000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.311502162.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.482249275.0000000000310000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.313250588.0000000001300000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 9.2.ORDDER-238486-LBT.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.ORDDER-238486-LBT.exe.400000.0.unpack, type: UNPACKEDPE

            Remote Access Functionality:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.312289231.0000000000FA0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.263822373.00000000038AE000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.311502162.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000015.00000002.482249275.0000000000310000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.313250588.0000000001300000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 9.2.ORDDER-238486-LBT.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.ORDDER-238486-LBT.exe.400000.0.unpack, type: UNPACKEDPE

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection612Rootkit1Credential API Hooking1Security Software Discovery331Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsShared Modules1Boot or Logon Initialization ScriptsScheduled Task/Job1Masquerading1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion41SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol11Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion41NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Information Discovery112VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing3Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 385266 Sample: ORDDER-238486-LBT.exe Startdate: 12/04/2021 Architecture: WINDOWS Score: 100 41 www.tndhaulingllc.com 2->41 45 Found malware configuration 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 Multi AV Scanner detection for dropped file 2->49 51 9 other signatures 2->51 11 ORDDER-238486-LBT.exe 7 2->11         started        signatures3 process4 file5 33 C:\Users\user\AppData\Roaming\CqbqIOaf.exe, PE32 11->33 dropped 35 C:\Users\...\CqbqIOaf.exe:Zone.Identifier, ASCII 11->35 dropped 37 C:\Users\user\AppData\Local\...\tmp1DD1.tmp, XML 11->37 dropped 39 C:\Users\user\...\ORDDER-238486-LBT.exe.log, ASCII 11->39 dropped 61 Uses schtasks.exe or at.exe to add and modify task schedules 11->61 63 Tries to detect virtualization through RDTSC time measurements 11->63 65 Injects a PE file into a foreign processes 11->65 15 ORDDER-238486-LBT.exe 11->15         started        18 schtasks.exe 1 11->18         started        signatures6 process7 signatures8 67 Modifies the context of a thread in another process (thread injection) 15->67 69 Maps a DLL or memory area into another process 15->69 71 Sample uses process hollowing technique 15->71 73 Queues an APC in another process (thread injection) 15->73 20 explorer.exe 15->20 injected 24 conhost.exe 18->24         started        process9 dnsIp10 43 www.dailyhealthyvibes.info 20->43 53 System process connects to network (likely due to code injection or exploit) 20->53 26 chkdsk.exe 20->26         started        signatures11 process12 signatures13 55 Modifies the context of a thread in another process (thread injection) 26->55 57 Maps a DLL or memory area into another process 26->57 59 Tries to detect virtualization through RDTSC time measurements 26->59 29 cmd.exe 1 26->29         started        process14 process15 31 conhost.exe 29->31         started       

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            ORDDER-238486-LBT.exe35%VirustotalBrowse
            ORDDER-238486-LBT.exe12%ReversingLabsWin32.PUA.Wacapew
            ORDDER-238486-LBT.exe100%Joe Sandbox ML

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\CqbqIOaf.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\CqbqIOaf.exe12%ReversingLabsWin32.PUA.Wacapew

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            9.2.ORDDER-238486-LBT.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.fontbureau.comicta#0%Avira URL Cloudsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.fontbureau.comalsF0%URL Reputationsafe
            http://www.fontbureau.comalsF0%URL Reputationsafe
            http://www.fontbureau.comalsF0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.sakkal.comm0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cnj0%Avira URL Cloudsafe
            http://www.founder.com.cn/cnw0%Avira URL Cloudsafe
            http://www.fontbureau.com10%Avira URL Cloudsafe
            http://www.founder.com.cn/cn_0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
            http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
            http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
            http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
            http://www.founder.com.cn/cnia0%Avira URL Cloudsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sajatypeworks.coma0%URL Reputationsafe
            http://www.sajatypeworks.coma0%URL Reputationsafe
            http://www.sajatypeworks.coma0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.de0%URL Reputationsafe
            http://www.urwpp.de0%URL Reputationsafe
            http://www.urwpp.de0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sajatypeworks.come0%URL Reputationsafe
            http://www.sajatypeworks.come0%URL Reputationsafe
            http://www.sajatypeworks.come0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.fontbureau.comF0%URL Reputationsafe
            http://www.fontbureau.comF0%URL Reputationsafe
            http://www.fontbureau.comF0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/vno0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/H0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/H0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/H0%URL Reputationsafe
            http://www.agfamonotype.L0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
            http://www.fontbureau.come.com0%URL Reputationsafe
            http://www.fontbureau.come.com0%URL Reputationsafe
            http://www.fontbureau.come.com0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.founder.com.cn/cn/0%URL Reputationsafe
            http://www.founder.com.cn/cn/0%URL Reputationsafe
            http://www.founder.com.cn/cn/0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.galapagosdesign.com/.0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/va0%Avira URL Cloudsafe
            www.valoremamma.com/cw3g/0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.fontbureau.comy0%Avira URL Cloudsafe
            http://www.fontbureau.comals0%URL Reputationsafe
            http://www.fontbureau.comals0%URL Reputationsafe
            http://www.fontbureau.comals0%URL Reputationsafe
            http://www.ascendercorp.com/typedesigners.htmlj0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            www.tndhaulingllc.com
            unknown
            unknowntrue
              unknown
              www.dailyhealthyvibes.info
              unknown
              unknowntrue
                unknown

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                www.valoremamma.com/cw3g/true
                • Avira URL Cloud: safe
                low

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://www.fontbureau.com/designersGORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                  high
                  http://www.fontbureau.com/designers/?ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                      high
                      http://www.fontbureau.comicta#ORDDER-238486-LBT.exe, 00000001.00000003.227367591.0000000005697000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name4ORDDER-238486-LBT.exe, 00000001.00000002.262667212.0000000002767000.00000004.00000001.sdmpfalse
                        high
                        http://www.tiro.comexplorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/de#6cNORDDER-238486-LBT.exe, 00000001.00000003.222445271.00000000056CE000.00000004.00000001.sdmpfalse
                          high
                          http://www.fontbureau.com/designersexplorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                            high
                            http://www.goodfont.co.krORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmpfalse
                              high
                              http://www.fontbureau.comalsFORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.sajatypeworks.comORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, ORDDER-238486-LBT.exe, 00000001.00000003.214609146.0000000005693000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.typography.netDORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn/cTheORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.sakkal.commORDDER-238486-LBT.exe, 00000001.00000003.221221240.0000000005695000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, ORDDER-238486-LBT.exe, 00000001.00000003.225337772.00000000056A4000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.comORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnjORDDER-238486-LBT.exe, 00000001.00000003.216737907.00000000009FD000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.founder.com.cn/cnwORDDER-238486-LBT.exe, 00000001.00000003.216897543.0000000005697000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com1ORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.com/ORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpfalse
                                high
                                http://www.founder.com.cn/cn_ORDDER-238486-LBT.exe, 00000001.00000003.216897543.0000000005697000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.galapagosdesign.com/DPleaseORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/Y0ORDDER-238486-LBT.exe, 00000001.00000003.220484294.0000000005695000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.ascendercorp.com/typedesigners.htmlORDDER-238486-LBT.exe, 00000001.00000003.221179983.00000000056D6000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-jones.htmlr-fORDDER-238486-LBT.exe, 00000001.00000003.222863618.00000000056A8000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.fonts.comORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cniaORDDER-238486-LBT.exe, 00000001.00000003.216700983.000000000569E000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.sandoll.co.krORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comaORDDER-238486-LBT.exe, 00000001.00000003.214609146.0000000005693000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deDPleaseORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameORDDER-238486-LBT.exe, 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmp, ORDDER-238486-LBT.exe, 00000001.00000002.262667212.0000000002767000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.sajatypeworks.comeORDDER-238486-LBT.exe, 00000001.00000003.214609146.0000000005693000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sakkal.comORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.apache.org/licenses/LICENSE-2.0ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.fontbureau.comORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                          high
                                          http://www.fontbureau.comFORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/vnoORDDER-238486-LBT.exe, 00000001.00000003.220484294.0000000005695000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/HORDDER-238486-LBT.exe, 00000001.00000003.220484294.0000000005695000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.agfamonotype.LORDDER-238486-LBT.exe, 00000001.00000003.221221240.0000000005695000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/jp/ORDDER-238486-LBT.exe, 00000001.00000003.220484294.0000000005695000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.come.comORDDER-238486-LBT.exe, 00000001.00000003.227367591.0000000005697000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.carterandcone.comlORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cn/ORDDER-238486-LBT.exe, 00000001.00000003.217069141.0000000005698000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/cabarga.htmlNORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cnORDDER-238486-LBT.exe, 00000001.00000003.217069141.0000000005698000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/.ORDDER-238486-LBT.exe, 00000001.00000003.225079564.00000000056A3000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.com/designers/frere-jones.htmlORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                              high
                                              http://www.jiyu-kobo.co.jp/vaORDDER-238486-LBT.exe, 00000001.00000003.220484294.0000000005695000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/ORDDER-238486-LBT.exe, 00000001.00000003.220484294.0000000005695000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers8ORDDER-238486-LBT.exe, 00000001.00000002.267258525.0000000005780000.00000002.00000001.sdmp, explorer.exe, 0000000A.00000000.292431218.0000000008B40000.00000002.00000001.sdmpfalse
                                                high
                                                http://www.fontbureau.comyORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.comalsORDDER-238486-LBT.exe, 00000001.00000003.223532515.0000000005695000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.ascendercorp.com/typedesigners.htmljORDDER-238486-LBT.exe, 00000001.00000003.221221240.0000000005695000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown

                                                Contacted IPs

                                                No contacted IP infos

                                                General Information

                                                Joe Sandbox Version:31.0.0 Emerald
                                                Analysis ID:385266
                                                Start date:12.04.2021
                                                Start time:09:16:15
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 11m 15s
                                                Hypervisor based Inspection enabled:false
                                                Report type:light
                                                Sample file name:ORDDER-238486-LBT.exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:31
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:1
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.evad.winEXE@10/4@2/0
                                                EGA Information:Failed
                                                HDC Information:
                                                • Successful, ratio: 17.5% (good quality ratio 15.7%)
                                                • Quality average: 72%
                                                • Quality standard deviation: 32.2%
                                                HCA Information:
                                                • Successful, ratio: 97%
                                                • Number of executed functions: 0
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Adjust boot time
                                                • Enable AMSI
                                                • Found application associated with file extension: .exe
                                                Warnings:
                                                Show All
                                                • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 92.122.145.220, 168.61.161.212, 52.147.198.201, 184.30.20.56, 20.50.102.62, 104.42.151.234, 104.43.193.48, 8.241.89.254, 8.241.79.254, 67.26.81.254, 8.241.89.126, 8.241.90.254, 92.122.213.194, 92.122.213.247, 104.43.139.144, 20.54.26.129, 20.82.209.183
                                                • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, fs.microsoft.com, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.

                                                Simulations

                                                Behavior and APIs

                                                TimeTypeDescription
                                                09:18:08API Interceptor1x Sleep call for process: ORDDER-238486-LBT.exe modified

                                                Joe Sandbox View / Context

                                                IPs

                                                No context

                                                Domains

                                                No context

                                                ASN

                                                No context

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                No context

                                                Created / dropped Files

                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDDER-238486-LBT.exe.log
                                                Process:C:\Users\user\Desktop\ORDDER-238486-LBT.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):1314
                                                Entropy (8bit):5.350128552078965
                                                Encrypted:false
                                                SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                Malicious:true
                                                Reputation:high, very likely benign file
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                C:\Users\user\AppData\Local\Temp\tmp1DD1.tmp
                                                Process:C:\Users\user\Desktop\ORDDER-238486-LBT.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1641
                                                Entropy (8bit):5.190351633985364
                                                Encrypted:false
                                                SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBZtn:cbh47TlNQ//rydbz9I3YODOLNdq31
                                                MD5:7998EE71FA2B38B94B2AE0B52CD35517
                                                SHA1:473F5C5644A5BEB5A8A3E3901CFAE99D386B739C
                                                SHA-256:087A6BF8CD6B666D0CC664ADEE23ECC105B4AA50E852075C7B6A6C1504D4FFB1
                                                SHA-512:02DD37857C8DB34FB2F4BCCEF8B8A522277F00F0A81BA21535510947D77CB42FDA5C8EC86D1D4D33C102E2A4DE9F0833EEA8792ECD68427DCA94E57D28A349A4
                                                Malicious:true
                                                Reputation:low
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                C:\Users\user\AppData\Roaming\CqbqIOaf.exe
                                                Process:C:\Users\user\Desktop\ORDDER-238486-LBT.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):843776
                                                Entropy (8bit):7.643368458338207
                                                Encrypted:false
                                                SSDEEP:12288:MWqVPMuk6Aws9YuUHxgf6X91ZLWKCiht0sJw5W5qY5QbTPSsXq60lKN7:M/kOs9YuUg4ZLukSkQbtXqYl
                                                MD5:D320967A90E6A8FD824864C53DC02135
                                                SHA1:345E589B268690D6A3F34686CDD0AF5368DE376C
                                                SHA-256:6E110B6474993B690F1BF6F2EDC01446010CE9BEF5375991693E2BFFA81D14FD
                                                SHA-512:25C64F2ED0F335214098F99D8EE244CDD4B439F3A93B75174AE84CF6EF0BEE2DBC8A32E5ECB777D9A934CBC86044242754BC143A20A3F3A8BD013278DC69700C
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 12%
                                                Reputation:low
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....s`..............P..8...........V... ...`....@.. .......................@............@.................................xV..O....`..$.................... ....................................................... ............... ..H............text....6... ...8.................. ..`.rsrc...$....`.......:..............@..@.reloc....... ......................@..B.................V......H.......$}...u...............c...........................................0............(....( .........(.....o!....*.....................("......(#......($......(%......(&....*N..(....o....('....*&..((....*.s)........s*........s+........s,........s-........*....0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0...........~....o2....+..*.0..<........~.....(3.....,!r...p.....(4...o5...s6............~.....+..*.0......
                                                C:\Users\user\AppData\Roaming\CqbqIOaf.exe:Zone.Identifier
                                                Process:C:\Users\user\Desktop\ORDDER-238486-LBT.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:true
                                                Reputation:high, very likely benign file
                                                Preview: [ZoneTransfer]....ZoneId=0

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.643368458338207
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                • DOS Executable Generic (2002/1) 0.01%
                                                File name:ORDDER-238486-LBT.exe
                                                File size:843776
                                                MD5:d320967a90e6a8fd824864c53dc02135
                                                SHA1:345e589b268690d6a3f34686cdd0af5368de376c
                                                SHA256:6e110b6474993b690f1bf6f2edc01446010ce9bef5375991693e2bffa81d14fd
                                                SHA512:25c64f2ed0f335214098f99d8ee244cdd4b439f3a93b75174ae84cf6ef0bee2dbc8a32e5ecb777d9a934cbc86044242754bc143a20a3f3a8bd013278dc69700c
                                                SSDEEP:12288:MWqVPMuk6Aws9YuUHxgf6X91ZLWKCiht0sJw5W5qY5QbTPSsXq60lKN7:M/kOs9YuUg4ZLukSkQbtXqYl
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....s`..............P..8...........V... ...`....@.. .......................@............@................................

                                                File Icon

                                                Icon Hash:cc92316d713396e8

                                                Static PE Info

                                                General

                                                Entrypoint:0x4b56ca
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x6073A40D [Mon Apr 12 01:36:13 2021 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:v4.0.30319
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                Entrypoint Preview

                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xb56780x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xb60000x1a324.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xd20000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xb36d00xb3800False0.954316460655data7.95061413978IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rsrc0xb60000x1a3240x1a400False0.141489955357data3.0228794934IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xd20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_ICON0xb62200x468GLS_BINARY_LSB_FIRST
                                                RT_ICON0xb66880x162aPNG image data, 256 x 256, 8-bit colormap, non-interlaced
                                                RT_ICON0xb7cb40x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                                RT_ICON0xba25c0x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                                                RT_ICON0xbb3040x10828dBase III DBT, version number 0, next free block index 40
                                                RT_ICON0xcbb2c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                                                RT_GROUP_ICON0xcfd540x5adata
                                                RT_VERSION0xcfdb00x386data
                                                RT_MANIFEST0xd01380x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                Imports

                                                DLLImport
                                                mscoree.dll_CorExeMain

                                                Version Infos

                                                DescriptionData
                                                Translation0x0000 0x04b0
                                                LegalCopyrightCopyright 2012
                                                Assembly Version8.1.1.15
                                                InternalNameComparisonResult.exe
                                                FileVersion8.1.1.14
                                                CompanyNameLandskip Yard Care
                                                LegalTrademarksA++
                                                Comments
                                                ProductNameLevelActivator
                                                ProductVersion8.1.1.14
                                                FileDescriptionLevelActivator
                                                OriginalFilenameComparisonResult.exe

                                                Network Behavior

                                                Network Port Distribution

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 12, 2021 09:17:53.285132885 CEST5128153192.168.2.38.8.8.8
                                                Apr 12, 2021 09:17:53.343862057 CEST53512818.8.8.8192.168.2.3
                                                Apr 12, 2021 09:17:53.526925087 CEST4919953192.168.2.38.8.8.8
                                                Apr 12, 2021 09:17:53.575629950 CEST53491998.8.8.8192.168.2.3
                                                Apr 12, 2021 09:18:10.366118908 CEST5062053192.168.2.38.8.8.8
                                                Apr 12, 2021 09:18:10.414875031 CEST53506208.8.8.8192.168.2.3
                                                Apr 12, 2021 09:18:25.432631969 CEST6493853192.168.2.38.8.8.8
                                                Apr 12, 2021 09:18:25.515925884 CEST53649388.8.8.8192.168.2.3
                                                Apr 12, 2021 09:18:29.561774015 CEST6015253192.168.2.38.8.8.8
                                                Apr 12, 2021 09:18:29.610610008 CEST53601528.8.8.8192.168.2.3
                                                Apr 12, 2021 09:18:40.763766050 CEST5754453192.168.2.38.8.8.8
                                                Apr 12, 2021 09:18:40.812427998 CEST53575448.8.8.8192.168.2.3
                                                Apr 12, 2021 09:18:41.926345110 CEST5598453192.168.2.38.8.8.8
                                                Apr 12, 2021 09:18:41.975071907 CEST53559848.8.8.8192.168.2.3
                                                Apr 12, 2021 09:18:43.743885040 CEST6418553192.168.2.38.8.8.8
                                                Apr 12, 2021 09:18:43.803793907 CEST53641858.8.8.8192.168.2.3
                                                Apr 12, 2021 09:18:45.061738014 CEST6511053192.168.2.38.8.8.8
                                                Apr 12, 2021 09:18:45.110645056 CEST53651108.8.8.8192.168.2.3
                                                Apr 12, 2021 09:18:47.190340996 CEST5836153192.168.2.38.8.8.8
                                                Apr 12, 2021 09:18:47.247328043 CEST53583618.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:00.678936005 CEST6349253192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:00.737627029 CEST53634928.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:12.542879105 CEST6083153192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:12.601038933 CEST53608318.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:13.580023050 CEST6010053192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:13.631684065 CEST53601008.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:16.027453899 CEST5319553192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:16.093424082 CEST53531958.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:19.089356899 CEST5014153192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:19.143817902 CEST53501418.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:20.071320057 CEST5302353192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:20.131479025 CEST53530238.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:23.866743088 CEST4956353192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:23.918381929 CEST53495638.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:24.813545942 CEST5135253192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:24.864968061 CEST53513528.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:29.126115084 CEST5934953192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:29.587069988 CEST53593498.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:30.570658922 CEST5708453192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:30.627811909 CEST53570848.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:31.484775066 CEST5882353192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:31.533787012 CEST53588238.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:39.058592081 CEST5756853192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:39.116033077 CEST53575688.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:42.241744041 CEST5054053192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:42.290544987 CEST53505408.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:44.107295990 CEST5436653192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:44.172200918 CEST53543668.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:48.458297014 CEST5303453192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:48.509835005 CEST53530348.8.8.8192.168.2.3
                                                Apr 12, 2021 09:19:49.367945910 CEST5776253192.168.2.38.8.8.8
                                                Apr 12, 2021 09:19:49.420788050 CEST53577628.8.8.8192.168.2.3
                                                Apr 12, 2021 09:20:07.887948036 CEST5543553192.168.2.38.8.8.8
                                                Apr 12, 2021 09:20:07.936563015 CEST53554358.8.8.8192.168.2.3
                                                Apr 12, 2021 09:20:09.483056068 CEST5071353192.168.2.38.8.8.8
                                                Apr 12, 2021 09:20:09.532433033 CEST53507138.8.8.8192.168.2.3
                                                Apr 12, 2021 09:20:09.934425116 CEST5613253192.168.2.38.8.8.8
                                                Apr 12, 2021 09:20:10.028915882 CEST53561328.8.8.8192.168.2.3

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Apr 12, 2021 09:19:29.126115084 CEST192.168.2.38.8.8.80x9aStandard query (0)www.dailyhealthyvibes.infoA (IP address)IN (0x0001)
                                                Apr 12, 2021 09:20:09.934425116 CEST192.168.2.38.8.8.80xb30dStandard query (0)www.tndhaulingllc.comA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Apr 12, 2021 09:19:29.587069988 CEST8.8.8.8192.168.2.30x9aName error (3)www.dailyhealthyvibes.infononenoneA (IP address)IN (0x0001)
                                                Apr 12, 2021 09:20:10.028915882 CEST8.8.8.8192.168.2.30xb30dName error (3)www.tndhaulingllc.comnonenoneA (IP address)IN (0x0001)

                                                Code Manipulations

                                                User Modules

                                                Hook Summary

                                                Function NameHook TypeActive in Processes
                                                PeekMessageAINLINEexplorer.exe
                                                PeekMessageWINLINEexplorer.exe
                                                GetMessageWINLINEexplorer.exe
                                                GetMessageAINLINEexplorer.exe

                                                Processes

                                                Process: explorer.exe, Module: user32.dll
                                                Function NameHook TypeNew Data
                                                PeekMessageAINLINE0x48 0x8B 0xB8 0x8B 0xBE 0xE6
                                                PeekMessageWINLINE0x48 0x8B 0xB8 0x83 0x3E 0xE6
                                                GetMessageWINLINE0x48 0x8B 0xB8 0x83 0x3E 0xE6
                                                GetMessageAINLINE0x48 0x8B 0xB8 0x8B 0xBE 0xE6

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:09:17:59
                                                Start date:12/04/2021
                                                Path:C:\Users\user\Desktop\ORDDER-238486-LBT.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\Desktop\ORDDER-238486-LBT.exe'
                                                Imagebase:0x200000
                                                File size:843776 bytes
                                                MD5 hash:D320967A90E6A8FD824864C53DC02135
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.262544972.0000000002701000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.262648767.0000000002753000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.263822373.00000000038AE000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.263822373.00000000038AE000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.263822373.00000000038AE000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:low

                                                General

                                                Start time:09:18:20
                                                Start date:12/04/2021
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CqbqIOaf' /XML 'C:\Users\user\AppData\Local\Temp\tmp1DD1.tmp'
                                                Imagebase:0x1360000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:09:18:21
                                                Start date:12/04/2021
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6b2800000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:09:18:22
                                                Start date:12/04/2021
                                                Path:C:\Users\user\Desktop\ORDDER-238486-LBT.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\Desktop\ORDDER-238486-LBT.exe
                                                Imagebase:0x540000
                                                File size:843776 bytes
                                                MD5 hash:D320967A90E6A8FD824864C53DC02135
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.312289231.0000000000FA0000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.312289231.0000000000FA0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.312289231.0000000000FA0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.311502162.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.311502162.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.311502162.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.313250588.0000000001300000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.313250588.0000000001300000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.313250588.0000000001300000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:low

                                                General

                                                Start time:09:18:24
                                                Start date:12/04/2021
                                                Path:C:\Windows\explorer.exe
                                                Wow64 process (32bit):false
                                                Commandline:
                                                Imagebase:0x7ff714890000
                                                File size:3933184 bytes
                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:09:18:42
                                                Start date:12/04/2021
                                                Path:C:\Windows\SysWOW64\chkdsk.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\SysWOW64\chkdsk.exe
                                                Imagebase:0x190000
                                                File size:23040 bytes
                                                MD5 hash:2D5A2497CB57C374B3AE3080FF9186FB
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000015.00000002.483795571.0000000004710000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000015.00000002.482249275.0000000000310000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000015.00000002.482249275.0000000000310000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000015.00000002.482249275.0000000000310000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:moderate

                                                General

                                                Start time:09:18:47
                                                Start date:12/04/2021
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:/c del 'C:\Users\user\Desktop\ORDDER-238486-LBT.exe'
                                                Imagebase:0x60000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:09:18:48
                                                Start date:12/04/2021
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6b2800000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                Disassembly

                                                Code Analysis

                                                Reset < >