Loading ...

Play interactive tourEdit tour

Windows Analysis Report arrival notice.exe

Overview

General Information

Sample Name:arrival notice.exe
Analysis ID:483532
MD5:4196c697fa8a52ecddad63bf5ac9e8f9
SHA1:1179a7916f59fa2d88829a56f3f045e1cf32c418
SHA256:cfdb27a9ff39bd1aa5a0a43fe6e272c269a311f5748d8a13b2e705f7d66f16bd
Tags:exe
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Self deletion via cmd delete
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
.NET source code contains very large strings
Tries to detect virtualization through RDTSC time measurements
Sigma detected: CMSTP Execution Process Creation
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Uses a Windows Living Off The Land Binaries (LOL bins)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Contains functionality to read the PEB
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Contains capabilities to detect virtual machines
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • arrival notice.exe (PID: 6556 cmdline: 'C:\Users\user\Desktop\arrival notice.exe' MD5: 4196C697FA8A52ECDDAD63BF5AC9E8F9)
    • arrival notice.exe (PID: 7160 cmdline: C:\Users\user\Desktop\arrival notice.exe MD5: 4196C697FA8A52ECDDAD63BF5AC9E8F9)
    • arrival notice.exe (PID: 3436 cmdline: C:\Users\user\Desktop\arrival notice.exe MD5: 4196C697FA8A52ECDDAD63BF5AC9E8F9)
      • explorer.exe (PID: 3424 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
      • cmstp.exe (PID: 6820 cmdline: C:\Windows\SysWOW64\cmstp.exe MD5: 4833E65ED211C7F118D4A11E6FB58A09)
        • cmd.exe (PID: 5948 cmdline: /c del 'C:\Users\user\Desktop\arrival notice.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 1260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • explorer.exe (PID: 4824 cmdline: 'C:\Windows\explorer.exe' /LOADSAVEDWINDOWS MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.nordicbatterybelt.net/n58i/"], "decoy": ["southerncircumstance.com", "mcsasco.com", "ifbrick.com", "societe-anonyme.net", "bantank.xyz", "dogecoin.beauty", "aboutacoffee.com", "babalandlordrealestate.com", "tintgta.com", "integrity.directory", "parwnr.icu", "poltishof.online", "stayandstyle.com", "ickjeame.xyz", "currentmotors.ca", "pond.fund", "petrosterzis.com", "deadbydaylightpoints.com", "hotel-balzac.paris", "focusmaintainance.com", "odeonmarket.com", "voeran.net", "lookailpop.xyz", "sashaignatenko.com", "royalgreenvillage.com", "airbhouse.com", "zl-dz.com", "fuwuxz.com", "wugupihuhepop.xyz", "zmdhysm.com", "luchin.site", "rnchaincvkbip.xyz", "fffddfrfqffrtgthhhbhffgfr.com", "goabbasoon.info", "booyahbucks.com", "ilovecoventry.com", "components-electronics.com", "advindustry.com", "browandline.com", "hotnspicy.site", "marlonj26.com", "holidays24.net", "starworks.online", "mbchaindogbbc.xyz", "3wouqg.com", "evnfreesx.com", "baureihe51.com", "hycelassetmanagement.space", "photostickomni-trendyfinds.com", "singisa4letterword.com", "thklw.online", "menramen.com", "highspeedinternetinc.com", "beerenhunger.info", "hisensor.world", "lassurancevalence.com", "clementchanlab.com", "customia.xyz", "alysvera-centroestetico.com", "cx-xiezuo.com", "index-mp3.com", "mybenefits51.com", "vyhozoi.site", "lingerista.net"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x85f8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8992:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x146a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x14191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x147a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x93aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa122:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19b97:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ac3a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x16ac9:$sqlite3step: 68 34 1C 7B E1
    • 0x16bdc:$sqlite3step: 68 34 1C 7B E1
    • 0x16af8:$sqlite3text: 68 38 2A 90 C5
    • 0x16c1d:$sqlite3text: 68 38 2A 90 C5
    • 0x16b0b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16c33:$sqlite3blob: 68 53 D8 7F 8C
    0000000E.00000002.987277254.0000000002E00000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000E.00000002.987277254.0000000002E00000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x85f8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8992:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x146a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x14191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x147a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x93aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa122:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x19b97:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1ac3a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 27 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      5.2.arrival notice.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        5.2.arrival notice.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x77f8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x7b92:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x138a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x13391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x139a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x13b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x85aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1260c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0x9322:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x18d97:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x19e3a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        5.2.arrival notice.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x15cc9:$sqlite3step: 68 34 1C 7B E1
        • 0x15ddc:$sqlite3step: 68 34 1C 7B E1
        • 0x15cf8:$sqlite3text: 68 38 2A 90 C5
        • 0x15e1d:$sqlite3text: 68 38 2A 90 C5
        • 0x15d0b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x15e33:$sqlite3blob: 68 53 D8 7F 8C
        5.2.arrival notice.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          5.2.arrival notice.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x85f8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8992:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x146a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x147a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x93aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa122:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x19b97:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1ac3a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 4 entries

          Sigma Overview

          System Summary:

          barindex
          Sigma detected: CMSTP Execution Process CreationShow sources
          Source: Process startedAuthor: Nik Seetharaman: Data: Command: /c del 'C:\Users\user\Desktop\arrival notice.exe', CommandLine: /c del 'C:\Users\user\Desktop\arrival notice.exe', CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Windows\SysWOW64\cmstp.exe, ParentImage: C:\Windows\SysWOW64\cmstp.exe, ParentProcessId: 6820, ProcessCommandLine: /c del 'C:\Users\user\Desktop\arrival notice.exe', ProcessId: 5948

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.nordicbatterybelt.net/n58i/"], "decoy": ["southerncircumstance.com", "mcsasco.com", "ifbrick.com", "societe-anonyme.net", "bantank.xyz", "dogecoin.beauty", "aboutacoffee.com", "babalandlordrealestate.com", "tintgta.com", "integrity.directory", "parwnr.icu", "poltishof.online", "stayandstyle.com", "ickjeame.xyz", "currentmotors.ca", "pond.fund", "petrosterzis.com", "deadbydaylightpoints.com", "hotel-balzac.paris", "focusmaintainance.com", "odeonmarket.com", "voeran.net", "lookailpop.xyz", "sashaignatenko.com", "royalgreenvillage.com", "airbhouse.com", "zl-dz.com", "fuwuxz.com", "wugupihuhepop.xyz", "zmdhysm.com", "luchin.site", "rnchaincvkbip.xyz", "fffddfrfqffrtgthhhbhffgfr.com", "goabbasoon.info", "booyahbucks.com", "ilovecoventry.com", "components-electronics.com", "advindustry.com", "browandline.com", "hotnspicy.site", "marlonj26.com", "holidays24.net", "starworks.online", "mbchaindogbbc.xyz", "3wouqg.com", "evnfreesx.com", "baureihe51.com", "hycelassetmanagement.space", "photostickomni-trendyfinds.com", "singisa4letterword.com", "thklw.online", "menramen.com", "highspeedinternetinc.com", "beerenhunger.info", "hisensor.world", "lassurancevalence.com", "clementchanlab.com", "customia.xyz", "alysvera-centroestetico.com", "cx-xiezuo.com", "index-mp3.com", "mybenefits51.com", "vyhozoi.site", "lingerista.net"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: arrival notice.exeVirustotal: Detection: 29%Perma Link
          Source: arrival notice.exeReversingLabs: Detection: 25%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 5.2.arrival notice.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.arrival notice.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.arrival notice.exe.37c44c0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.987277254.0000000002E00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.712937418.000000000EC67000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.986144684.00000000007B0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.672365867.00000000035F9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.672532960.00000000036F2000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.699881557.000000000EC67000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.752247585.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.753557009.0000000001280000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.987219865.0000000002DD0000.00000040.00020000.sdmp, type: MEMORY
          Machine Learning detection for sampleShow sources
          Source: arrival notice.exeJoe Sandbox ML: detected
          Source: 5.2.arrival notice.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: arrival notice.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: arrival notice.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: cmstp.pdbGCTL source: arrival notice.exe, 00000005.00000003.750476475.0000000001341000.00000004.00000001.sdmp
          Source: Binary string: \Registry\Machine\Software\Classes\SystemFileAssociations\.pdbsqrstuvwxyz{|}~ source: explorer.exe, 00000017.00000003.920395188.0000000007E54000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: arrival notice.exe, 00000005.00000002.753977107.00000000015D0000.00000040.00000001.sdmp, cmstp.exe, 0000000E.00000002.988607183.0000000004A6F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: arrival notice.exe, cmstp.exe
          Source: Binary string: cmstp.pdb source: arrival notice.exe, 00000005.00000003.750476475.0000000001341000.00000004.00000001.sdmp
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 4x nop then pop edi

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.nordicbatterybelt.net/n58i/
          Source: explorer.exe, 00000017.00000002.964094196.0000000007301000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: explorer.exe, 00000017.00000000.937508363.0000000007EE6000.00000004.00000001.sdmpString found in binary or memory: http://crl.v
          Source: explorer.exe, 00000017.00000002.958150774.000000000348F000.00000004.00000001.sdmpString found in binary or memory: http://ns.adoqw
          Source: arrival notice.exe, 00000000.00000002.671468135.0000000000A00000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 5.2.arrival notice.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.arrival notice.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.arrival notice.exe.37c44c0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.987277254.0000000002E00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.712937418.000000000EC67000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.986144684.00000000007B0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.672365867.00000000035F9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.672532960.00000000036F2000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.699881557.000000000EC67000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.752247585.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.753557009.0000000001280000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.987219865.0000000002DD0000.00000040.00020000.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 5.2.arrival notice.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.arrival notice.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.2.arrival notice.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.arrival notice.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.arrival notice.exe.37c44c0.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.arrival notice.exe.37c44c0.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000E.00000002.987277254.0000000002E00000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000E.00000002.987277254.0000000002E00000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000000.712937418.000000000EC67000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000000.712937418.000000000EC67000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000E.00000002.986144684.00000000007B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000E.00000002.986144684.00000000007B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.672365867.00000000035F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.672365867.00000000035F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.672532960.00000000036F2000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.672532960.00000000036F2000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000000.699881557.000000000EC67000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000000.699881557.000000000EC67000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.752247585.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.752247585.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.753557009.0000000001280000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.753557009.0000000001280000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000E.00000002.987219865.0000000002DD0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000E.00000002.987219865.0000000002DD0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Initial sample is a PE file and has a suspicious nameShow sources
          Source: initial sampleStatic PE information: Filename: arrival notice.exe
          .NET source code contains very large stringsShow sources
          Source: arrival notice.exe, Forms/mainForm.csLong String: Length: 38272
          Source: 0.0.arrival notice.exe.250000.0.unpack, Forms/mainForm.csLong String: Length: 38272
          Source: 0.2.arrival notice.exe.250000.0.unpack, Forms/mainForm.csLong String: Length: 38272
          Source: 4.2.arrival notice.exe.330000.0.unpack, Forms/mainForm.csLong String: Length: 38272
          Source: 4.0.arrival notice.exe.330000.0.unpack, Forms/mainForm.csLong String: Length: 38272
          Source: 5.2.arrival notice.exe.b50000.1.unpack, Forms/mainForm.csLong String: Length: 38272
          Source: 5.0.arrival notice.exe.b50000.0.unpack, Forms/mainForm.csLong String: Length: 38272
          Source: arrival notice.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Windows\SysWOW64\cmstp.exe C:\Windows\SysWOW64\cmstp.exe
          Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Windows\SysWOW64\cmstp.exe C:\Windows\SysWOW64\cmstp.exe
          Source: 5.2.arrival notice.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.arrival notice.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.2.arrival notice.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.arrival notice.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.arrival notice.exe.37c44c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.arrival notice.exe.37c44c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000E.00000002.987277254.0000000002E00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000E.00000002.987277254.0000000002E00000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000000.712937418.000000000EC67000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000000.712937418.000000000EC67000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000E.00000002.986144684.00000000007B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000E.00000002.986144684.00000000007B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.672365867.00000000035F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.672365867.00000000035F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.672532960.00000000036F2000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.672532960.00000000036F2000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000000.699881557.000000000EC67000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000000.699881557.000000000EC67000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.752247585.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.752247585.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.753557009.0000000001280000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.753557009.0000000001280000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000E.00000002.987219865.0000000002DD0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000E.00000002.987219865.0000000002DD0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02442FC4
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02442BF8
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02443949
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02446918
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02443763
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02443768
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02442BED
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02440040
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02443460
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02443470
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02440033
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02440C93
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02440C98
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_0244017C
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02440135
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_024439F1
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_024DC124
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_024DE562
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_024DE570
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_00401030
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0041B8DB
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0041C136
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0041D229
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_00408C6B
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_00408C70
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_00402D87
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_00402D90
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_00402FB0
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01614120
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FF900
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1002
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C28EC
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016220A0
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C20A8
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160B090
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C2B28
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016BDBD2
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162EBB0
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C22AE
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C1D55
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C2D07
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F0D20
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160D5E0
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C25DD
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01622581
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016BD466
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160841F
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C1FF1
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01616E30
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C2EF7
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498841F
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A3D466
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A2581
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498D5E0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A425DD
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A42D07
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04970D20
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A41D55
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A42EF7
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04996E30
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A3D616
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A41FF1
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498B090
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A420A8
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A20A0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A428EC
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31002
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497F900
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04994120
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A422AE
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AEBB0
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A3DBD2
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A42B28
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007CB8DB
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007CC136
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007CD229
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007B8C70
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007B8C6B
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007B2D90
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007B2D87
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007B2FB0
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: String function: 015FB150 appears 35 times
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: String function: 0497B150 appears 35 times
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_004185D0 NtCreateFile,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_00418680 NtReadFile,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_00418700 NtClose,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_004187B0 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_004185CA NtCreateFile,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0041867C NtReadFile,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_004186FB NtClose,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_004187AC NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016399A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016398F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016395D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016397A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016396E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016399D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0163B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016398A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0163A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639A10 NtQuerySection,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639560 NtWriteFile,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0163AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016395F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639760 NtOpenProcess,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0163A770 NtOpenThread,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0163A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639670 NtQueryInformationProcess,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01639610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016396D0 NtCreateKey,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B95D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B96D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B95F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049BAD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9560 NtWriteFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B97A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049BA710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049BA770 NtOpenThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B98A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B98F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049BB040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B99D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049BA3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B9B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007C85D0 NtCreateFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007C8680 NtReadFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007C8700 NtClose,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007C87B0 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007C85CA NtCreateFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007C867C NtReadFile,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007C86FB NtClose,
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007C87AC NtAllocateVirtualMemory,
          Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 98%
          Source: arrival notice.exe, 00000000.00000002.671032767.0000000000311000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFileSystemAccessRu.exe4 vs arrival notice.exe
          Source: arrival notice.exe, 00000000.00000002.672532960.00000000036F2000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCF_Secretaria.dll< vs arrival notice.exe
          Source: arrival notice.exe, 00000000.00000002.671468135.0000000000A00000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs arrival notice.exe
          Source: arrival notice.exe, 00000004.00000002.669288896.00000000003F1000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFileSystemAccessRu.exe4 vs arrival notice.exe
          Source: arrival notice.exe, 00000005.00000002.753082192.0000000000C11000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameFileSystemAccessRu.exe4 vs arrival notice.exe
          Source: arrival notice.exe, 00000005.00000003.750476475.0000000001341000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCMSTP.EXE` vs arrival notice.exe
          Source: arrival notice.exe, 00000005.00000002.754621837.000000000187F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs arrival notice.exe
          Source: arrival notice.exeBinary or memory string: OriginalFilenameFileSystemAccessRu.exe4 vs arrival notice.exe
          Source: C:\Windows\explorer.exeSection loaded: explorerframe.dll
          Source: arrival notice.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: arrival notice.exeVirustotal: Detection: 29%
          Source: arrival notice.exeReversingLabs: Detection: 25%
          Source: arrival notice.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\arrival notice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\arrival notice.exe 'C:\Users\user\Desktop\arrival notice.exe'
          Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Users\user\Desktop\arrival notice.exe C:\Users\user\Desktop\arrival notice.exe
          Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Users\user\Desktop\arrival notice.exe C:\Users\user\Desktop\arrival notice.exe
          Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Windows\SysWOW64\cmstp.exe C:\Windows\SysWOW64\cmstp.exe
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\arrival notice.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\explorer.exe 'C:\Windows\explorer.exe' /LOADSAVEDWINDOWS
          Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Users\user\Desktop\arrival notice.exe C:\Users\user\Desktop\arrival notice.exe
          Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Users\user\Desktop\arrival notice.exe C:\Users\user\Desktop\arrival notice.exe
          Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Windows\SysWOW64\cmstp.exe C:\Windows\SysWOW64\cmstp.exe
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\arrival notice.exe'
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{660b90c8-73a9-4b58-8cae-355b7f55341b}\InProcServer32
          Source: C:\Users\user\Desktop\arrival notice.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\arrival notice.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@11/1@0/0
          Source: C:\Windows\explorer.exeFile read: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1260:120:WilError_01
          Source: C:\Users\user\Desktop\arrival notice.exeMutant created: \Sessions\1\BaseNamedObjects\RmVhorZfszBwlBtnIDjIbw
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\explorer.exe
          Source: arrival notice.exe, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.0.arrival notice.exe.250000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.2.arrival notice.exe.250000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 4.2.arrival notice.exe.330000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 4.0.arrival notice.exe.330000.0.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 5.2.arrival notice.exe.b50000.1.unpack, Forms/mainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\arrival notice.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: arrival notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: arrival notice.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: arrival notice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: cmstp.pdbGCTL source: arrival notice.exe, 00000005.00000003.750476475.0000000001341000.00000004.00000001.sdmp
          Source: Binary string: \Registry\Machine\Software\Classes\SystemFileAssociations\.pdbsqrstuvwxyz{|}~ source: explorer.exe, 00000017.00000003.920395188.0000000007E54000.00000004.00000001.sdmp
          Source: Binary string: wntdll.pdbUGP source: arrival notice.exe, 00000005.00000002.753977107.00000000015D0000.00000040.00000001.sdmp, cmstp.exe, 0000000E.00000002.988607183.0000000004A6F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: arrival notice.exe, cmstp.exe
          Source: Binary string: cmstp.pdb source: arrival notice.exe, 00000005.00000003.750476475.0000000001341000.00000004.00000001.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: arrival notice.exe, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.arrival notice.exe.250000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.arrival notice.exe.250000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.2.arrival notice.exe.330000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.0.arrival notice.exe.330000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.2.arrival notice.exe.b50000.1.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.arrival notice.exe.b50000.0.unpack, Forms/mainForm.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_02440BCE push eax; ret
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_0244095D push cs; ret
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 0_2_024DF932 push esp; iretd
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0041B87C push eax; ret
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0041B812 push eax; ret
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0041B81B push eax; ret
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_00412A95 pushfd ; retf
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_00415BB5 push eax; retf
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_004186CA push edx; retn 0076h
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0040169B push es; iretd
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_00414EA9 push es; ret
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0041B7C5 push eax; ret
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0164D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049CD0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007CB87C push eax; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007CB81B push eax; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007CB812 push eax; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007C2A95 pushfd ; retf
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007C5BB5 push eax; retf
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007C86CA push edx; retn 0076h
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007C4EA9 push es; ret
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007B169B push es; iretd
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_007CB7C5 push eax; ret
          Source: arrival notice.exeStatic PE information: 0xD983B25D [Wed Aug 22 02:45:49 2085 UTC]
          Source: initial sampleStatic PE information: section name: .text entropy: 7.21116196113

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Self deletion via cmd deleteShow sources
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: /c del 'C:\Users\user\Desktop\arrival notice.exe'
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: /c del 'C:\Users\user\Desktop\arrival notice.exe'
          Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\cmstp.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000000.00000002.672048372.00000000025F1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: arrival notice.exe PID: 6556, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: arrival notice.exe, 00000000.00000002.672048372.00000000025F1000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: arrival notice.exe, 00000000.00000002.672048372.00000000025F1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\arrival notice.exeRDTSC instruction interceptor: First address: 00000000004085F4 second address: 00000000004085FA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\arrival notice.exeRDTSC instruction interceptor: First address: 000000000040898E second address: 0000000000408994 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmstp.exeRDTSC instruction interceptor: First address: 00000000007B85F4 second address: 00000000007B85FA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\cmstp.exeRDTSC instruction interceptor: First address: 00000000007B898E second address: 00000000007B8994 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\arrival notice.exe TID: 408Thread sleep time: -34495s >= -30000s
          Source: C:\Users\user\Desktop\arrival notice.exe TID: 6048Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_004088C0 rdtsc
          Source: C:\Users\user\Desktop\arrival notice.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\explorer.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#5&1ec51bf7&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\arrival notice.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\arrival notice.exeThread delayed: delay time: 34495
          Source: C:\Users\user\Desktop\arrival notice.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 00000017.00000000.936563895.0000000007DC6000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000017.00000000.935429236.0000000007C8C000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: explorer.exe, 00000017.00000002.978731366.0000000010C80000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000017.00000000.947587812.0000000010C46000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B&y
          Source: arrival notice.exe, 00000000.00000002.672048372.00000000025F1000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000006.00000000.697420081.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: arrival notice.exe, 00000000.00000002.672048372.00000000025F1000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: explorer.exe, 00000017.00000002.971257205.0000000007E9A000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: arrival notice.exe, 00000000.00000002.672048372.00000000025F1000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000006.00000000.691216251.0000000004710000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000[Wm
          Source: explorer.exe, 00000006.00000000.681755458.000000000A716000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000/
          Source: explorer.exe, 00000017.00000003.920395188.0000000007E54000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSCPROCESSOR_ARCHITECTURE=AMD64PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 85 Stepping 7, GenuineIntelPROCESSOR_LEVEL=6PROCESSOR_REVISION=5507ProgramData=C:\ProgramDataProgramFiles=C:\Program FilesProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPSModulePath=%ProgramFiles(x86)%\WindowsPowerShell\Modules;C:\WindI)
          Source: explorer.exe, 00000006.00000000.681755458.000000000A716000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000@
          Source: explorer.exe, 00000017.00000003.922155884.000000000802B000.00000004.00000001.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}\5
          Source: explorer.exe, 00000017.00000000.936869351.0000000007E11000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b})$
          Source: arrival notice.exe, 00000000.00000002.672048372.00000000025F1000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: explorer.exe, 00000017.00000000.946541212.0000000010A12000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00g-
          Source: explorer.exe, 00000017.00000000.947587812.0000000010C46000.00000004.00000001.sdmpBinary or memory string: 806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
          Source: explorer.exe, 00000017.00000002.971185699.0000000007E54000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}+,-.B
          Source: arrival notice.exe, 00000000.00000002.672048372.00000000025F1000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000017.00000000.926519337.0000000007250000.00000004.00000001.sdmpBinary or memory string: ;;SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000017.00000000.926519337.0000000007250000.00000004.00000001.sdmpBinary or memory string: AASCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 00000017.00000002.971185699.0000000007E54000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BO
          Source: explorer.exe, 00000006.00000000.700139481.000000000FD4C000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}**
          Source: explorer.exe, 00000017.00000003.920395188.0000000007E54000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BD
          Source: explorer.exe, 00000006.00000000.705062273.0000000004791000.00000004.00000001.sdmpBinary or memory string: War&Prod_VMware_SATA~
          Source: explorer.exe, 00000017.00000002.971185699.0000000007E54000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B=
          Source: explorer.exe, 00000017.00000000.947587812.0000000010C46000.00000004.00000001.sdmpBinary or memory string: }#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
          Source: explorer.exe, 00000017.00000000.947587812.0000000010C46000.00000004.00000001.sdmpBinary or memory string: #{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BWwu
          Source: explorer.exe, 00000017.00000003.920700975.0000000007F6A000.00000004.00000001.sdmpBinary or memory string: NECVMWarVMware SATA CD001.00
          Source: explorer.exe, 00000017.00000002.971185699.0000000007E54000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8
          Source: explorer.exe, 00000006.00000000.681755458.000000000A716000.00000004.00000001.sdmpBinary or memory string: War&Prod_VMware_SATAa
          Source: explorer.exe, 00000017.00000000.947587812.0000000010C46000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Bq-
          Source: explorer.exe, 00000017.00000003.879265675.00000000072B9000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
          Source: explorer.exe, 00000017.00000000.936869351.0000000007E11000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}}%f
          Source: explorer.exe, 00000017.00000000.947587812.0000000010C46000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&
          Source: explorer.exe, 00000017.00000002.971185699.0000000007E54000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Be
          Source: explorer.exe, 00000017.00000000.947587812.0000000010C46000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001vy
          Source: arrival notice.exe, 00000000.00000002.672048372.00000000025F1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: arrival notice.exe, 00000000.00000002.672048372.00000000025F1000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: explorer.exe, 00000017.00000000.947587812.0000000010C46000.00000004.00000001.sdmpBinary or memory string: 0cd0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c98b}
          Source: explorer.exe, 00000017.00000000.937315762.0000000007E91000.00000004.00000001.sdmpBinary or memory string: War&Prod_VMware_ 6
          Source: explorer.exe, 00000006.00000000.705062273.0000000004791000.00000004.00000001.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000017.00000002.972528039.000000000802D000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: arrival notice.exe, 00000000.00000002.672048372.00000000025F1000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000006.00000000.695643302.0000000006650000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000017.00000000.947587812.0000000010C46000.00000004.00000001.sdmpBinary or memory string: ?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
          Source: explorer.exe, 00000017.00000002.972528039.000000000802D000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}A
          Source: explorer.exe, 00000017.00000000.947587812.0000000010C46000.00000004.00000001.sdmpBinary or memory string: 6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
          Source: explorer.exe, 00000017.00000000.936869351.0000000007E11000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}|$e
          Source: explorer.exe, 00000017.00000000.947587812.0000000010C46000.00000004.00000001.sdmpBinary or memory string: _VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
          Source: explorer.exe, 00000017.00000000.947587812.0000000010C46000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}es'
          Source: explorer.exe, 00000017.00000003.922155884.000000000802B000.00000004.00000001.sdmpBinary or memory string: \??\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}b8b}
          Source: explorer.exe, 00000017.00000002.956628054.00000000013D9000.00000004.00000020.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_004088C0 rdtsc
          Source: C:\Users\user\Desktop\arrival notice.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\arrival notice.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\cmstp.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0161B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0161B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01614120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01614120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01614120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01614120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01614120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016841E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016769A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016261A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016261A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016751BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016751BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016751BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016751BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0161C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01622990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01610050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01610050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01677016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01677016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01677016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0168B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0168B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0168B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0168B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0168B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0168B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016220A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016390AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01673884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01673884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01623B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01623B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016203E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0161DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016753CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016753CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01624BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01624BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01624BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016AD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01601B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01601B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01622397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016AB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016AB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0163927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016BEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01684257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01634A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01634A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01608A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01613A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01622AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01622ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0161C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0161C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01633D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01673540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01617D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0167A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016BE539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01603D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01603D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01603D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01603D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01603D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01603D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01603D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01603D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01603D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01603D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01603D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01603D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01603D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01624D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01624D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01624D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016BFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016BFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016BFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016BFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016A8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01676DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01676DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01676DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01676DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01676DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01676DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016235A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01621DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01621DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01621DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01622581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01622581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01622581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01622581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0161746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0168C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0168C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01676C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01676C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01676C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01676C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01676CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01676CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01676CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015F4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0161F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0168FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0168FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016337F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01677794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01677794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01677794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01608794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0160766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0161AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0161AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0161AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0161AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0161AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01607E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01607E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01607E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01607E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01607E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01607E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016BAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016BAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016AFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01628E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016B1608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0162A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_015FE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016216E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016076E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_01638EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016AFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016236CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016746A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_016C0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_0168FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A314FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A48CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A4740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A4740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A4740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049ABC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A0C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A0C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0499746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A405AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A405AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04972D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04972D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04972D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04972D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04972D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A3FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A3FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A3FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A3FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A28DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F6DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A48D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A3E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049FA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04983D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04983D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04983D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04983D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04983D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04983D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04983D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04983D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04983D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04983D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04983D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04983D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04983D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04997D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0499C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0499C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A40EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A40EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A40EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A0FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B8EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A2FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A48ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049876E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A2FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A31608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04987E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04987E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04987E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04987E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04987E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04987E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A3AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A3AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0499AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0499AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0499AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0499AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0499AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04988794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0499F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A4070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A4070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A0FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A0FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04974F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04974F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A48F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04979080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A0B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A0B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A0B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A0B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A0B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A0B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049758EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A44015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A44015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04990050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04990050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A32073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A41074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0499C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049F69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A041E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04979100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04979100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04979100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04994120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04994120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04994120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04994120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04994120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0499B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0499B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0498AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049AFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049A2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_0497AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04993A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04975210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04975210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04975210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04975210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04988A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A3AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A3AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_049B4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A2B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A2B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04A48A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04979240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04979240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\cmstp.exeCode function: 14_2_04979240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\arrival notice.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\cmstp.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\arrival notice.exeCode function: 5_2_00409B30 LdrLoadDll,
          Source: C:\Users\user\Desktop\arrival notice.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\arrival notice.exeSection unmapped: C:\Windows\SysWOW64\cmstp.exe base address: 990000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmstp.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\arrival notice.exeSection loaded: unknown target: C:\Windows\SysWOW64\cmstp.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: unknown target: unknown protection: read write
          Source: C:\Windows\SysWOW64\cmstp.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\arrival notice.exeMemory written: C:\Users\user\Desktop\arrival notice.exe base: 400000 value starts with: 4D5A
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\arrival notice.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\arrival notice.exeThread register set: target process: 3424
          Source: C:\Users\user\Desktop\arrival notice.exeThread register set: target process: 3424
          Source: C:\Windows\SysWOW64\cmstp.exeThread register set: target process: 3424
          Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Users\user\Desktop\arrival notice.exe C:\Users\user\Desktop\arrival notice.exe
          Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Users\user\Desktop\arrival notice.exe C:\Users\user\Desktop\arrival notice.exe
          Source: C:\Users\user\Desktop\arrival notice.exeProcess created: C:\Windows\SysWOW64\cmstp.exe C:\Windows\SysWOW64\cmstp.exe
          Source: C:\Windows\SysWOW64\cmstp.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\arrival notice.exe'
          Source: cmstp.exe, 0000000E.00000002.987454284.0000000003200000.00000002.00020000.sdmp, explorer.exe, 00000017.00000002.957503713.00000000019C0000.00000002.00020000.sdmpBinary or memory string: Program Manager{`
          Source: explorer.exe, 00000006.00000000.731035953.0000000000AD8000.00000004.00000020.sdmpBinary or memory string: ProgmanMD6
          Source: explorer.exe, 00000006.00000000.704269802.0000000001080000.00000002.00020000.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000006.00000000.678978874.0000000005E50000.00000004.00000001.sdmp, cmstp.exe, 0000000E.00000002.987454284.0000000003200000.00000002.00020000.sdmp, explorer.exe, 00000017.00000000.921285178.00000000056C0000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000006.00000000.704269802.0000000001080000.00000002.00020000.sdmp, cmstp.exe, 0000000E.00000002.987454284.0000000003200000.00000002.00020000.sdmp, explorer.exe, 00000017.00000000.921285178.00000000056C0000.00000004.00000001.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000006.00000000.704269802.0000000001080000.00000002.00020000.sdmp, cmstp.exe, 0000000E.00000002.987454284.0000000003200000.00000002.00020000.sdmp, explorer.exe, 00000017.00000002.957503713.00000000019C0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000017.00000002.956628054.00000000013D9000.00000004.00000020.sdmpBinary or memory string: Progmanw
          Source: explorer.exe, 00000006.00000000.681755458.000000000A716000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd5D
          Source: explorer.exe, 00000017.00000002.961116396.00000000054E0000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd3
          Source: C:\Users\user\Desktop\arrival notice.exeQueries volume information: C:\Users\user\Desktop\arrival notice.exe VolumeInformation
          Source: C:\Users\user\Desktop\arrival notice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\arrival notice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\arrival notice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\arrival notice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\arrival notice.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 5.2.arrival notice.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.arrival notice.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.arrival notice.exe.37c44c0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.987277254.0000000002E00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.712937418.000000000EC67000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.986144684.00000000007B0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.672365867.00000000035F9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.672532960.00000000036F2000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.699881557.000000000EC67000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.752247585.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.753557009.0000000001280000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.987219865.0000000002DD0000.00000040.00020000.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 5.2.arrival notice.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.arrival notice.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.arrival notice.exe.37c44c0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.987277254.0000000002E00000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.712937418.000000000EC67000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.986144684.00000000007B0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.672365867.00000000035F9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.672532960.00000000036F2000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.699881557.000000000EC67000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.752247585.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.753557009.0000000001280000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.987219865.0000000002DD0000.00000040.00020000.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1DLL Side-Loading1Process Injection512Masquerading1Input Capture1Query Registry1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Disable or Modify Tools1LSASS MemorySecurity Software Discovery231Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion41Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection512NTDSVirtualization/Sandbox Evasion41Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information11LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information4Cached Domain CredentialsSystem Information Discovery112VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobTimestomp1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)DLL Side-Loading1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)File Deletion1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          arrival notice.exe30%VirustotalBrowse
          arrival notice.exe26%ReversingLabsByteCode-MSIL.Trojan.Pwsx
          arrival notice.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          5.2.arrival notice.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://ns.adoqw0%Avira URL Cloudsafe
          http://crl.v0%URL Reputationsafe
          www.nordicbatterybelt.net/n58i/0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          No contacted domains info

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          www.nordicbatterybelt.net/n58i/true
          • Avira URL Cloud: safe
          low

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://ns.adoqwexplorer.exe, 00000017.00000002.958150774.000000000348F000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.vexplorer.exe, 00000017.00000000.937508363.0000000007EE6000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          unknown

          Contacted IPs

          No contacted IP infos

          General Information

          Joe Sandbox Version:33.0.0 White Diamond
          Analysis ID:483532
          Start date:15.09.2021
          Start time:08:27:14
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 11m 24s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:arrival notice.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:28
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@11/1@0/0
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 19.6% (good quality ratio 17.5%)
          • Quality average: 73.5%
          • Quality standard deviation: 31.9%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          Warnings:
          Show All
          • Exclude process from analysis (whitelisted): SearchUI.exe, BackgroundTransferHost.exe, WerFault.exe, ShellExperienceHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtCreateFile calls found.
          • Report size getting too big, too many NtEnumerateKey calls found.
          • Report size getting too big, too many NtEnumerateValueKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryAttributesFile calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          08:28:10API Interceptor1x Sleep call for process: arrival notice.exe modified
          08:29:44API Interceptor111x Sleep call for process: explorer.exe modified

          Joe Sandbox View / Context

          IPs

          No context

          Domains

          No context

          ASN

          No context

          JA3 Fingerprints

          No context

          Dropped Files

          No context

          Created / dropped Files

          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\arrival notice.exe.log
          Process:C:\Users\user\Desktop\arrival notice.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1216
          Entropy (8bit):5.355304211458859
          Encrypted:false
          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
          MD5:FED34146BF2F2FA59DCF8702FCC8232E
          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
          Malicious:true
          Reputation:high, very likely benign file
          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

          Static File Info

          General

          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):6.378713027704192
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          • Win32 Executable (generic) a (10002005/4) 49.78%
          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
          • Generic Win/DOS Executable (2004/3) 0.01%
          • DOS Executable Generic (2002/1) 0.01%
          File name:arrival notice.exe
          File size:780288
          MD5:4196c697fa8a52ecddad63bf5ac9e8f9
          SHA1:1179a7916f59fa2d88829a56f3f045e1cf32c418
          SHA256:cfdb27a9ff39bd1aa5a0a43fe6e272c269a311f5748d8a13b2e705f7d66f16bd
          SHA512:8c78d2a8276fd10c118732b194865fcd40615beb8ad47459e0ce5c67097d57d66c5764c0eaf8ebdbb7591b3ff03c26f0aa90d7dd7484b8f4709c9a79c607d5a0
          SSDEEP:6144:bThvfD5lQDbCMN4K4CwdAbOo3kUnVVorbcLuKUCHWGyGSL5w2P3g6zsGJO5SVkGw:PWHCM2K4CLAOwb+uxvDfvrso6SE+7k
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...].................0......>........... ........@.. .......................@............@................................

          File Icon

          Icon Hash:76d9635381490100

          Static PE Info

          General

          Entrypoint:0x48c7ba
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Time Stamp:0xD983B25D [Wed Aug 22 02:45:49 2085 UTC]
          TLS Callbacks:
          CLR (.Net) Version:v4.0.30319
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

          Entrypoint Preview

          Instruction
          jmp dword ptr [00402000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al

          Data Directories

          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x8c7680x4f.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x8e0000x33a9c.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0xc20000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x8c74c0x1c.text
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

          Sections

          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x8a7c00x8a800False0.766751396097data7.21116196113IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          .rsrc0x8e0000x33a9c0x33c00False0.128995886171data2.6232852429IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0xc20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

          Resources

          NameRVASizeTypeLanguageCountry
          RT_ICON0x8e1300x33428dBase IV DBT, block length 6144, next free block index 40, next free block 4294967295, next used block 4294967295
          RT_GROUP_ICON0xc15580x14data
          RT_VERSION0xc156c0x344data
          RT_MANIFEST0xc18b00x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

          Imports

          DLLImport
          mscoree.dll_CorExeMain

          Version Infos

          DescriptionData
          Translation0x0000 0x04b0
          LegalCopyrightCopyright 2019
          Assembly Version1.0.0.0
          InternalNameFileSystemAccessRu.exe
          FileVersion1.0.0.0
          CompanyName
          LegalTrademarks
          Comments
          ProductNameDisciples
          ProductVersion1.0.0.0
          FileDescriptionDisciples
          OriginalFilenameFileSystemAccessRu.exe

          Network Behavior

          No network behavior found

          Code Manipulations

          Statistics

          Behavior

          Click to jump to process

          System Behavior

          General

          Start time:08:28:07
          Start date:15/09/2021
          Path:C:\Users\user\Desktop\arrival notice.exe
          Wow64 process (32bit):true
          Commandline:'C:\Users\user\Desktop\arrival notice.exe'
          Imagebase:0x250000
          File size:780288 bytes
          MD5 hash:4196C697FA8A52ECDDAD63BF5AC9E8F9
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:.Net C# or VB.NET
          Yara matches:
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.672365867.00000000035F9000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.672365867.00000000035F9000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.672365867.00000000035F9000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.672532960.00000000036F2000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.672532960.00000000036F2000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.672532960.00000000036F2000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.672048372.00000000025F1000.00000004.00000001.sdmp, Author: Joe Security
          Reputation:low

          General

          Start time:08:28:13
          Start date:15/09/2021
          Path:C:\Users\user\Desktop\arrival notice.exe
          Wow64 process (32bit):false
          Commandline:C:\Users\user\Desktop\arrival notice.exe
          Imagebase:0x330000
          File size:780288 bytes
          MD5 hash:4196C697FA8A52ECDDAD63BF5AC9E8F9
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low

          General

          Start time:08:28:13
          Start date:15/09/2021
          Path:C:\Users\user\Desktop\arrival notice.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\arrival notice.exe
          Imagebase:0xb50000
          File size:780288 bytes
          MD5 hash:4196C697FA8A52ECDDAD63BF5AC9E8F9
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmp, Author: Joe Security
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.753650396.00000000012B0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.752247585.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.752247585.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.752247585.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.753557009.0000000001280000.00000040.00020000.sdmp, Author: Joe Security
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.753557009.0000000001280000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.753557009.0000000001280000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
          Reputation:low

          General

          Start time:08:28:15
          Start date:15/09/2021
          Path:C:\Windows\explorer.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\Explorer.EXE
          Imagebase:0x7ff6fee60000
          File size:3933184 bytes
          MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000000.712937418.000000000EC67000.00000040.00020000.sdmp, Author: Joe Security
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000000.712937418.000000000EC67000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000000.712937418.000000000EC67000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000000.699881557.000000000EC67000.00000040.00020000.sdmp, Author: Joe Security
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000000.699881557.000000000EC67000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000000.699881557.000000000EC67000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
          Reputation:high

          General

          Start time:08:28:51
          Start date:15/09/2021
          Path:C:\Windows\SysWOW64\cmstp.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\SysWOW64\cmstp.exe
          Imagebase:0x990000
          File size:82944 bytes
          MD5 hash:4833E65ED211C7F118D4A11E6FB58A09
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000E.00000002.987277254.0000000002E00000.00000004.00000001.sdmp, Author: Joe Security
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000E.00000002.987277254.0000000002E00000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000E.00000002.987277254.0000000002E00000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000E.00000002.986144684.00000000007B0000.00000040.00020000.sdmp, Author: Joe Security
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000E.00000002.986144684.00000000007B0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000E.00000002.986144684.00000000007B0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000E.00000002.987219865.0000000002DD0000.00000040.00020000.sdmp, Author: Joe Security
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000E.00000002.987219865.0000000002DD0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000E.00000002.987219865.0000000002DD0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
          Reputation:moderate

          General

          Start time:08:28:53
          Start date:15/09/2021
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:/c del 'C:\Users\user\Desktop\arrival notice.exe'
          Imagebase:0x11d0000
          File size:232960 bytes
          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          General

          Start time:08:28:54
          Start date:15/09/2021
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff724c50000
          File size:625664 bytes
          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          General

          Start time:08:29:43
          Start date:15/09/2021
          Path:C:\Windows\explorer.exe
          Wow64 process (32bit):false
          Commandline:'C:\Windows\explorer.exe' /LOADSAVEDWINDOWS
          Imagebase:0x7ff6fee60000
          File size:3933184 bytes
          MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Disassembly

          Code Analysis

          Reset < >