Loading ...

Play interactive tourEdit tour

Windows Analysis Report SecuriteInfo.com.Scr.Malcodegdn30.14926.25699

Overview

General Information

Sample Name:SecuriteInfo.com.Scr.Malcodegdn30.14926.25699 (renamed file extension from 25699 to exe)
Analysis ID:483813
MD5:cca4950623ac43e8be352cd121ba8261
SHA1:e4f64701acab28b77b84257ccb418811c397650f
SHA256:17b08e4418f813543e91ad18ae2e50ecfe40692d9b5dec854e94ec0abbc92b11
Tags:exeFormbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large strings
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.midwestamericanwoman.com/ajki/"], "decoy": ["elborivegano.com", "jacksbookbuddies.com", "gentciu.com", "lovetattoonorteguadalix.com", "dahlkar.com", "hjobjiihna.club", "narccar.com", "noexcuseadventure.com", "mortongroverealestateinfo.com", "pursuegoodtimes.com", "becomearepresentativetoday.com", "20bagger.com", "lowestprices.space", "qzgay.com", "thegoenkapost.com", "glassdooronline.com", "quantizesoftware.com", "bayleighmphotography.com", "hzmm97.com", "theexoticbox.com", "verishop.site", "meusyouunlimited.com", "hvtnywveba.club", "yffuture.com", "bandsignsandgraphics.com", "rhealending.com", "studentlegalforms.com", "fubonbank.xyz", "themuslim101.com", "gigwindow.com", "thevillaflora.com", "fontankarecords.com", "liaofeng2008.com", "emerging.global", "rutasecretas.com", "imtheonlyperson.global", "bestforcrypto.com", "adasnspa.com", "abilityhomehealthservices.com", "travelfever-reiseblog.com", "redtail.football", "teatrodomorcego.com", "myfunkyshirt.com", "volanch.com", "ophelia.company", "learniapp.com", "inspiredsoulgifts.com", "citestasdsadasdwebzai.com", "wwwrijra.com", "esensites.com", "projetmaison64.com", "dailytipsones.com", "opticseurasia.com", "muslimsinsport.com", "kissbeauties.com", "aminarzhang.com", "empirepanada.com", "nilalvesfotografia.com", "eswensai.com", "espaciomeig.com", "pos010000.com", "qireys.com", "shethrivesvirtual.com", "nailch.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18409:$sqlite3step: 68 34 1C 7B E1
    • 0x1851c:$sqlite3step: 68 34 1C 7B E1
    • 0x18438:$sqlite3text: 68 38 2A 90 C5
    • 0x1855d:$sqlite3text: 68 38 2A 90 C5
    • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
    00000000.00000002.374444260.0000000002BA2000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000000.00000002.374827398.0000000003B99000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
        Click to see the 3 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15685:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15171:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15787:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x158ff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa57a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x143ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb273:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b327:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c32a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x18409:$sqlite3step: 68 34 1C 7B E1
          • 0x1851c:$sqlite3step: 68 34 1C 7B E1
          • 0x18438:$sqlite3text: 68 38 2A 90 C5
          • 0x1855d:$sqlite3text: 68 38 2A 90 C5
          • 0x1844b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x18573:$sqlite3blob: 68 53 D8 7F 8C
          1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
            1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
            • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x8d62:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x14885:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
            • 0x14371:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
            • 0x14987:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
            • 0x14aff:$sequence_4: 5D C3 8D 50 7C 80 FA 07
            • 0x977a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
            • 0x135ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
            • 0xa473:$sequence_7: 66 89 0C 02 5B 8B E5 5D
            • 0x1a527:$sequence_8: 3C 54 74 04 3C 74 75 F4
            • 0x1b52a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
            Click to see the 1 entries

            Sigma Overview

            No Sigma rule has matched

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.midwestamericanwoman.com/ajki/"], "decoy": ["elborivegano.com", "jacksbookbuddies.com", "gentciu.com", "lovetattoonorteguadalix.com", "dahlkar.com", "hjobjiihna.club", "narccar.com", "noexcuseadventure.com", "mortongroverealestateinfo.com", "pursuegoodtimes.com", "becomearepresentativetoday.com", "20bagger.com", "lowestprices.space", "qzgay.com", "thegoenkapost.com", "glassdooronline.com", "quantizesoftware.com", "bayleighmphotography.com", "hzmm97.com", "theexoticbox.com", "verishop.site", "meusyouunlimited.com", "hvtnywveba.club", "yffuture.com", "bandsignsandgraphics.com", "rhealending.com", "studentlegalforms.com", "fubonbank.xyz", "themuslim101.com", "gigwindow.com", "thevillaflora.com", "fontankarecords.com", "liaofeng2008.com", "emerging.global", "rutasecretas.com", "imtheonlyperson.global", "bestforcrypto.com", "adasnspa.com", "abilityhomehealthservices.com", "travelfever-reiseblog.com", "redtail.football", "teatrodomorcego.com", "myfunkyshirt.com", "volanch.com", "ophelia.company", "learniapp.com", "inspiredsoulgifts.com", "citestasdsadasdwebzai.com", "wwwrijra.com", "esensites.com", "projetmaison64.com", "dailytipsones.com", "opticseurasia.com", "muslimsinsport.com", "kissbeauties.com", "aminarzhang.com", "empirepanada.com", "nilalvesfotografia.com", "eswensai.com", "espaciomeig.com", "pos010000.com", "qireys.com", "shethrivesvirtual.com", "nailch.com"]}
            Multi AV Scanner detection for submitted fileShow sources
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeVirustotal: Detection: 22%Perma Link
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeReversingLabs: Detection: 22%
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.374827398.0000000003B99000.00000004.00000001.sdmp, type: MEMORY
            Antivirus detection for URL or domainShow sources
            Source: www.midwestamericanwoman.com/ajki/Avira URL Cloud: Label: malware
            Multi AV Scanner detection for domain / URLShow sources
            Source: www.midwestamericanwoman.com/ajki/Virustotal: Detection: 5%Perma Link
            Source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000001.00000002.375218047.000000000155F000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000001.00000002.375218047.000000000155F000.00000040.00000001.sdmp
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 4x nop then pop ebx1_2_00407AE3
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 4x nop then pop edi1_2_0040E441
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 4x nop then pop edi1_2_00417D6E

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: www.midwestamericanwoman.com/ajki/
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

            E-Banking Fraud:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.374827398.0000000003B99000.00000004.00000001.sdmp, type: MEMORY

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.374827398.0000000003B99000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000000.00000002.374827398.0000000003B99000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            .NET source code contains very large stringsShow sources
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, Form1.csLong String: Length: 38272
            Source: 0.0.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.860000.0.unpack, Form1.csLong String: Length: 38272
            Source: 0.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.860000.0.unpack, Form1.csLong String: Length: 38272
            Source: 1.0.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.970000.0.unpack, Form1.csLong String: Length: 38272
            Source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.970000.1.unpack, Form1.csLong String: Length: 38272
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.374827398.0000000003B99000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000000.00000002.374827398.0000000003B99000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 0_2_00868CF40_2_00868CF4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 0_2_02B7E6180_2_02B7E618
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 0_2_02B7E6080_2_02B7E608
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041E8751_2_0041E875
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041E0271_2_0041E027
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_004010301_2_00401030
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041D91D1_2_0041D91D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041DA051_2_0041DA05
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041D5C81_2_0041D5C8
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00402D901_2_00402D90
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00409E401_2_00409E40
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00409E3B1_2_00409E3B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041D7601_2_0041D760
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041CFA31_2_0041CFA3
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00402FB01_2_00402FB0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00978CF41_2_00978CF4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00419D60 NtCreateFile,1_2_00419D60
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00419E10 NtReadFile,1_2_00419E10
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00419E90 NtClose,1_2_00419E90
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00419F40 NtAllocateVirtualMemory,1_2_00419F40
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00419E8B NtClose,1_2_00419E8B
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00419F3A NtAllocateVirtualMemory,1_2_00419F3A
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.378089358.0000000007420000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameCF_Secretaria.dll< vs SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000000.352664339.0000000000862000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLoadConte.exeh$ vs SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.377933544.0000000007160000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameEnvoySinks.dll6 vs SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000001.00000002.375819716.00000000016EF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000001.00000000.372794912.0000000000972000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameLoadConte.exeh$ vs SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeBinary or memory string: OriginalFilenameLoadConte.exeh$ vs SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeVirustotal: Detection: 22%
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeReversingLabs: Detection: 22%
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe'
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@3/1@0/0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 0.0.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.860000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 0.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.860000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 1.0.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.970000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.970000.1.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000001.00000002.375218047.000000000155F000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000001.00000002.375218047.000000000155F000.00000040.00000001.sdmp

            Data Obfuscation:

            barindex
            .NET source code contains potential unpackerShow sources
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.860000.0.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.860000.0.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 1.0.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.970000.0.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.970000.1.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 0_2_0086297F push 20000001h; retf 0_2_00862992
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00417869 push 2AF2D80Eh; ret 1_2_0041786E
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_004170E3 push ecx; iretw 1_2_004170E4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00417146 push edi; ret 1_2_00417151
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041711F pushfd ; retf 1_2_00417120
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041720B push 0000004Bh; retf 1_2_0041721D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00407A8D push FFFFFF88h; ret 1_2_00407A8F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041E410 push D4941EB5h; ret 1_2_0041E42E
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041D5C8 push ecx; ret 1_2_0041D75D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041CEB5 push eax; ret 1_2_0041CF08
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041CF6C push eax; ret 1_2_0041CF72
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041CF02 push eax; ret 1_2_0041CF08
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0041CF0B push eax; ret 1_2_0041CF72
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00417721 push edi; ret 1_2_00417728
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_0097297F push 20000001h; retf 1_2_00972992
            Source: initial sampleStatic PE information: section name: .text entropy: 7.55363015372
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM3Show sources
            Source: Yara matchFile source: 00000000.00000002.374444260.0000000002BA2000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe PID: 776, type: MEMORYSTR
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.374444260.0000000002BA2000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.374444260.0000000002BA2000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeRDTSC instruction interceptor: First address: 0000000000409B5E second address: 0000000000409B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe TID: 976Thread sleep time: -34999s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe TID: 1748Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00409A90 rdtsc 1_2_00409A90
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeThread delayed: delay time: 34999Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.374444260.0000000002BA2000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.374444260.0000000002BA2000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.374444260.0000000002BA2000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.374444260.0000000002BA2000.00000004.00000001.sdmpBinary or memory string: VMWARE
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.374444260.0000000002BA2000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.374444260.0000000002BA2000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.374444260.0000000002BA2000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
            Source: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.374444260.0000000002BA2000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeCode function: 1_2_00409A90 rdtsc 1_2_00409A90
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Injects a PE file into a foreign processesShow sources
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.374827398.0000000003B99000.00000004.00000001.sdmp, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.374827398.0000000003B99000.00000004.00000001.sdmp, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection111Masquerading1OS Credential DumpingSecurity Software Discovery221Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection111NTDSSystem Information Discovery112Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information3Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            SecuriteInfo.com.Scr.Malcodegdn30.14926.exe22%VirustotalBrowse
            SecuriteInfo.com.Scr.Malcodegdn30.14926.exe22%ReversingLabsByteCode-MSIL.Trojan.SnakeKeylogger

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            1.2.SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            www.midwestamericanwoman.com/ajki/6%VirustotalBrowse
            www.midwestamericanwoman.com/ajki/100%Avira URL Cloudmalware
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            No contacted domains info

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            www.midwestamericanwoman.com/ajki/true
            • 6%, Virustotal, Browse
            • Avira URL Cloud: malware
            low

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
              high
              http://www.fontbureau.comSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                high
                http://www.fontbureau.com/designersGSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                  high
                  http://www.fontbureau.com/designers/?SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                      high
                      http://www.tiro.comSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                        high
                        http://www.goodfont.co.krSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comlSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8SecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                              high
                              http://www.fonts.comSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                                high
                                http://www.sandoll.co.krSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleaseSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sakkal.comSecuriteInfo.com.Scr.Malcodegdn30.14926.exe, 00000000.00000002.376863059.0000000006C82000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown

                                Contacted IPs

                                No contacted IP infos

                                General Information

                                Joe Sandbox Version:33.0.0 White Diamond
                                Analysis ID:483813
                                Start date:15.09.2021
                                Start time:14:17:16
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 7m 7s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Sample file name:SecuriteInfo.com.Scr.Malcodegdn30.14926.25699 (renamed file extension from 25699 to exe)
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:2
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@3/1@0/0
                                EGA Information:Failed
                                HDC Information:
                                • Successful, ratio: 21.2% (good quality ratio 20.6%)
                                • Quality average: 76.2%
                                • Quality standard deviation: 26.4%
                                HCA Information:
                                • Successful, ratio: 99%
                                • Number of executed functions: 16
                                • Number of non-executed functions: 6
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Stop behavior analysis, all processes terminated
                                Warnings:
                                Show All
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                14:18:27API Interceptor1x Sleep call for process: SecuriteInfo.com.Scr.Malcodegdn30.14926.exe modified

                                Joe Sandbox View / Context

                                IPs

                                No context

                                Domains

                                No context

                                ASN

                                No context

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe.log
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1216
                                Entropy (8bit):5.355304211458859
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                                Static File Info

                                General

                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.4841617330315415
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
                                File size:721408
                                MD5:cca4950623ac43e8be352cd121ba8261
                                SHA1:e4f64701acab28b77b84257ccb418811c397650f
                                SHA256:17b08e4418f813543e91ad18ae2e50ecfe40692d9b5dec854e94ec0abbc92b11
                                SHA512:d9ad10f18822b8f38f314433abc6c6bc26d429ec4fc2be4a62ec016a91387ea00eef7069b24f2255a6e44cd57d958e80480ce36a67f9a0db2ec027744e125e43
                                SSDEEP:12288:FZWHCM2K4CRI/yzQs2TaIpIInMpiuskOOxO7xakoq9laQCI:FL3CWMIpIAUbxADlZCI
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Aa..............0......n........... ........@.. .......................`............@................................

                                File Icon

                                Icon Hash:f1f0f4d0eecccc71

                                Static PE Info

                                General

                                Entrypoint:0x4ab0a6
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                Time Stamp:0x6141BBDD [Wed Sep 15 09:24:45 2021 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:v4.0.30319
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                Entrypoint Preview

                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al

                                Data Directories

                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xab0540x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x6b80.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xb40000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                Sections

                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000xa90ac0xa9200False0.827605321508data7.55363015372IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rsrc0xac0000x6b800x6c00False0.442563657407data5.0922815023IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xb40000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                Resources

                                NameRVASizeTypeLanguageCountry
                                RT_ICON0xac2000x668data
                                RT_ICON0xac8780x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 1953594267, next used block 28725
                                RT_ICON0xacb700x128GLS_BINARY_LSB_FIRST
                                RT_ICON0xacca80xea8data
                                RT_ICON0xadb600x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 0, next used block 0
                                RT_ICON0xae4180x568GLS_BINARY_LSB_FIRST
                                RT_ICON0xae9900x25a8data
                                RT_ICON0xb0f480x10a8data
                                RT_ICON0xb20000x468GLS_BINARY_LSB_FIRST
                                RT_GROUP_ICON0xb24780x84data
                                RT_VERSION0xb250c0x474data
                                RT_MANIFEST0xb29900x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                Imports

                                DLLImport
                                mscoree.dll_CorExeMain

                                Version Infos

                                DescriptionData
                                Translation0x0000 0x04b0
                                LegalCopyrightCopyright 2008 - 2010
                                Assembly Version1.3.0.0
                                InternalNameLoadConte.exe
                                FileVersion1.3.0.0
                                CompanyNameWHC
                                LegalTrademarks
                                CommentsA little Tool where you can check the stats of your RYL - Risk Your Life - characters. Ruins of War version.
                                ProductNameRYL Character Tool - RoW EU version
                                ProductVersion1.3.0.0
                                FileDescriptionRYL Character Tool - RoW EU version
                                OriginalFilenameLoadConte.exe

                                Network Behavior

                                No network behavior found

                                Code Manipulations

                                Statistics

                                CPU Usage

                                Click to jump to process

                                Memory Usage

                                Click to jump to process

                                High Level Behavior Distribution

                                Click to dive into process behavior distribution

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:14:18:19
                                Start date:15/09/2021
                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe'
                                Imagebase:0x860000
                                File size:721408 bytes
                                MD5 hash:CCA4950623AC43E8BE352CD121BA8261
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.374444260.0000000002BA2000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.374827398.0000000003B99000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.374827398.0000000003B99000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.374827398.0000000003B99000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                Reputation:low

                                General

                                Start time:14:18:28
                                Start date:15/09/2021
                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Scr.Malcodegdn30.14926.exe
                                Imagebase:0x970000
                                File size:721408 bytes
                                MD5 hash:CCA4950623AC43E8BE352CD121BA8261
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                Reputation:low

                                Disassembly

                                Code Analysis

                                Reset < >

                                  Executed Functions

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 02B7968E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.374365214.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID: N$N
                                  • API String ID: 4139908857-1044518071
                                  • Opcode ID: ec14e772978651b6a6fd4b80bebfcda4f001b021010fbc013c3490329d720514
                                  • Instruction ID: f936993820936455afe0100e945f5fa265d306af9db86a1257100520d2322c6d
                                  • Opcode Fuzzy Hash: ec14e772978651b6a6fd4b80bebfcda4f001b021010fbc013c3490329d720514
                                  • Instruction Fuzzy Hash: DC7112B0A00B058FD724DF2AD54575ABBF5FF88204F108A6ED4AAD7A50DB35E8058F91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02B7FEAA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.374365214.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 631a69d4319dc04b00ac2c7c21f2e830d9f4a1297c2968bc15358ce819a545de
                                  • Instruction ID: de58f28b9a260820cc77fbf7e9175458701b18208134494a43ed3bdeaae81cf7
                                  • Opcode Fuzzy Hash: 631a69d4319dc04b00ac2c7c21f2e830d9f4a1297c2968bc15358ce819a545de
                                  • Instruction Fuzzy Hash: CB51CEB1D003099FDB14CF9AC984AEEBBB5FF48314F24816AE819AB210D7759885CF94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 02B75421
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.374365214.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 6ced15687593b550fcdef0dae96f154ca9128091624b50c18460065bae068195
                                  • Instruction ID: 1c45f4099ab2307d825817231147aaa024f377d2466025f4ae5b5faba0679f76
                                  • Opcode Fuzzy Hash: 6ced15687593b550fcdef0dae96f154ca9128091624b50c18460065bae068195
                                  • Instruction Fuzzy Hash: 8441E471C0061DCBDB24CFA9C984BCDBBB5BF48308F6484AAD819BB254DBB56945CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 02B75421
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.374365214.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: da6c8d65c02a6b4ee75386491983cb63f9e6bdf7e54b7ea7fb8956505775135a
                                  • Instruction ID: 2d4a647d313a1c09188d2ed4938ae85c1aad3995844ef7d317617bd221db357e
                                  • Opcode Fuzzy Hash: da6c8d65c02a6b4ee75386491983cb63f9e6bdf7e54b7ea7fb8956505775135a
                                  • Instruction Fuzzy Hash: 7C41E271C00619CBDB24CFA9C984BCDBBB5BF48308F6484AAD418BB251DB756949CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02B7B91E,?,?,?,?,?), ref: 02B7BDE7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.374365214.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: cff4beb47255439c3bc12a7fcab6d11396255c5492945d02c669c87600240942
                                  • Instruction ID: ba1a479197420f5d54dd8c7855480d5abb923a06e025338e9cb3f8e7a30f374d
                                  • Opcode Fuzzy Hash: cff4beb47255439c3bc12a7fcab6d11396255c5492945d02c669c87600240942
                                  • Instruction Fuzzy Hash: 5821E6B5900209DFDB10CF9AD984ADEBFF8EB48324F14845AE924B3310D378A954CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02B79709,00000800,00000000,00000000), ref: 02B7991A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.374365214.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 8ad8a575b0aa3645e04cd789c2c30e31c720f94c6ff490a6a42a8a7afd3891c9
                                  • Instruction ID: c7f05266c6eb25a5b3fcbe700dc7b642804120eb3499da2e4db7f4ddfb45b63b
                                  • Opcode Fuzzy Hash: 8ad8a575b0aa3645e04cd789c2c30e31c720f94c6ff490a6a42a8a7afd3891c9
                                  • Instruction Fuzzy Hash: 791103B69006099FDB10CF9AC944ADEFBF4EB88324F14846AD925B7200D375A945CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 02B7968E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.374365214.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 7993dda527cef5dea7ce068ce1e585e536bcbc5c8ed7c97ef4df673ed217a659
                                  • Instruction ID: e3d684ae920fff2937fcdb39edf02c0ce3d2dc51c78427c707ba04faad367516
                                  • Opcode Fuzzy Hash: 7993dda527cef5dea7ce068ce1e585e536bcbc5c8ed7c97ef4df673ed217a659
                                  • Instruction Fuzzy Hash: 1811E3B6D006498FCB10CF9AC944BDEFBF4EF48224F14856AD429B7610D375A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Non-executed Functions

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.373597596.0000000000862000.00000002.00020000.sdmp, Offset: 00860000, based on PE: true
                                  • Associated: 00000000.00000002.373528483.0000000000860000.00000002.00020000.sdmp Download File
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eb613bd492c3a2605e15b1dacae0b956398fd8204264a26b093f2ce32d41cc83
                                  • Instruction ID: db73a04fa445f7b1277bae5e12b5c11ff3a1fbca3fcbd00a82d6bf6e5cda545a
                                  • Opcode Fuzzy Hash: eb613bd492c3a2605e15b1dacae0b956398fd8204264a26b093f2ce32d41cc83
                                  • Instruction Fuzzy Hash: 9423F62244E3D29FC7138B788CB16D17FB5AE5721471E09CBD4C08F4B3D268696AD762
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.374365214.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d9665d8e7e8fbb99d0258d453ad6ac990018fcbb49fc9a7f1dcacd96e8abb215
                                  • Instruction ID: 8ab66430d00500fd3fd5314d03644baeae9d290f7b15c33c4e2a8efeaec61f69
                                  • Opcode Fuzzy Hash: d9665d8e7e8fbb99d0258d453ad6ac990018fcbb49fc9a7f1dcacd96e8abb215
                                  • Instruction Fuzzy Hash: 1F12B2B14217468AD310CF65ED9B18D3FA1B745B2CFB84A09E2612EAE1DBBC114BCF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.374365214.0000000002B70000.00000040.00000001.sdmp, Offset: 02B70000, based on PE: false
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 000810c7789bf66b4aa4fe5ecbbcb0fc85497bd13a140bafbd2673903fb1d07d
                                  • Instruction ID: 5308b2c3195c82627eb306499e7c6989cc7e41269d1c7e889e1d281c01b45041
                                  • Opcode Fuzzy Hash: 000810c7789bf66b4aa4fe5ecbbcb0fc85497bd13a140bafbd2673903fb1d07d
                                  • Instruction Fuzzy Hash: 00C1E9B18217468AD710CF65ED8B18D7FA1BB45B2CF684A09E2616FAD0DFB8104BCF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Executed Functions

                                  C-Code - Quality: 37%
                                  			E00419E10(intOrPtr _a4, char _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28, char _a32, intOrPtr _a36, intOrPtr _a40) {
                                  				void* _t18;
                                  				void* _t27;
                                  				void* _t28;
                                  				intOrPtr* _t29;
                                  
                                  				_t13 = _a4;
                                  				_t29 = _a4 + 0xc48;
                                  				E0041A960(_t27, _t13, _t29,  *((intOrPtr*)(_t13 + 0x10)), 0, 0x2a);
                                  				_t6 =  &_a32; // 0x414d42
                                  				_t12 =  &_a8; // 0x414d42
                                  				_t18 =  *((intOrPtr*)( *_t29))( *_t12, _a12, _a16, _a20, _a24, _a28,  *_t6, _a36, _a40, _t28); // executed
                                  				return _t18;
                                  			}







                                  0x00419e13
                                  0x00419e1f
                                  0x00419e27
                                  0x00419e32
                                  0x00419e4d
                                  0x00419e55
                                  0x00000000

                                  APIs
                                  • NtReadFile.NTDLL(BMA,5EB6522D,FFFFFFFF,00414A01,?,?,BMA,?,00414A01,FFFFFFFF,5EB6522D,00414D42,?,00000000), ref: 00419E55
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                  Yara matches
                                  Similarity
                                  • API ID: FileRead
                                  • String ID: BMA$BMA
                                  • API String ID: 2738559852-2163208940
                                  • Opcode ID: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                  • Instruction ID: bd248b349f18b2ced93d1e709abaf342431bbeaaaaa26160fd0c904447d41470
                                  • Opcode Fuzzy Hash: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                  • Instruction Fuzzy Hash: 45F0B7B2210208AFCB14DF89DC81EEB77ADEF8C754F158649BE1DA7241D630E851CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00419D60(intOrPtr _a4, HANDLE* _a8, long _a12, struct _EXCEPTION_RECORD _a16, struct _ERESOURCE_LITE _a20, struct _GUID _a24, long _a28, long _a32, long _a36, long _a40, void* _a44, long _a48) {
                                  				long _t21;
                                  				void* _t31;
                                  
                                  				_t3 = _a4 + 0xc40; // 0xc40
                                  				E0041A960(_t31, _a4, _t3,  *((intOrPtr*)(_a4 + 0x10)), 0, 0x28);
                                  				_t21 = NtCreateFile(_a8, _a12, _a16, _a20, _a24, _a28, _a32, _a36, _a40, _a44, _a48); // executed
                                  				return _t21;
                                  			}





                                  0x00419d6f
                                  0x00419d77
                                  0x00419dad
                                  0x00419db1

                                  APIs
                                  • NtCreateFile.NTDLL(00000060,00409CD3,?,00414B87,00409CD3,FFFFFFFF,?,?,FFFFFFFF,00409CD3,00414B87,?,00409CD3,00000060,00000000,00000000), ref: 00419DAD
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                  • Instruction ID: 5d405ca8330a7760d33d8cb8f94c0e61ce0ec213ce21d6c827413d184fac496c
                                  • Opcode Fuzzy Hash: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                  • Instruction Fuzzy Hash: F1F0B2B2211208ABCB08CF89DC85EEB77ADAF8C754F158248BA0D97241C630E8518BA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00419F3A(intOrPtr _a4, void* _a8, PVOID* _a12, long _a16, long* _a20, long _a24, long _a28) {
                                  				intOrPtr _v117;
                                  				long _t16;
                                  				void* _t23;
                                  
                                  				_v117 = ss;
                                  				_t12 = _a4;
                                  				_t4 = _t12 + 0xc60; // 0xca0
                                  				E0041A960(_t23, _a4, _t4,  *((intOrPtr*)(_a4 + 0x10)), 0, 0x30);
                                  				_t16 = NtAllocateVirtualMemory(_a8, _a12, _a16, _a20, _a24, _a28); // executed
                                  				return _t16;
                                  			}






                                  0x00419f3f
                                  0x00419f43
                                  0x00419f4f
                                  0x00419f57
                                  0x00419f79
                                  0x00419f7d

                                  APIs
                                  • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041AB34,?,00000000,?,00003000,00000040,00000000,00000000,00409CD3), ref: 00419F79
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateMemoryVirtual
                                  • String ID:
                                  • API String ID: 2167126740-0
                                  • Opcode ID: f6b1aaa9c734c5f4826da12f7643716fc3954363fbc1dfede306a11937f8aa44
                                  • Instruction ID: b314eb8ae7bcfce70a335ccee70f2e15eb2b0450cb1dc35e74dca4c2f12f6dc3
                                  • Opcode Fuzzy Hash: f6b1aaa9c734c5f4826da12f7643716fc3954363fbc1dfede306a11937f8aa44
                                  • Instruction Fuzzy Hash: 47F01CB2210118AFCB14DF99CC81EEB77A9EF8C754F158549FE5DA7241D630E811CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00419F40(intOrPtr _a4, void* _a8, PVOID* _a12, long _a16, long* _a20, long _a24, long _a28) {
                                  				long _t14;
                                  				void* _t21;
                                  
                                  				_t3 = _a4 + 0xc60; // 0xca0
                                  				E0041A960(_t21, _a4, _t3,  *((intOrPtr*)(_a4 + 0x10)), 0, 0x30);
                                  				_t14 = NtAllocateVirtualMemory(_a8, _a12, _a16, _a20, _a24, _a28); // executed
                                  				return _t14;
                                  			}





                                  0x00419f4f
                                  0x00419f57
                                  0x00419f79
                                  0x00419f7d

                                  APIs
                                  • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041AB34,?,00000000,?,00003000,00000040,00000000,00000000,00409CD3), ref: 00419F79
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateMemoryVirtual
                                  • String ID:
                                  • API String ID: 2167126740-0
                                  • Opcode ID: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                  • Instruction ID: 9c08e1581e5817f7e91e4b21b7a397560e598f802d56d9274a49c90b7c070efe
                                  • Opcode Fuzzy Hash: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                  • Instruction Fuzzy Hash: 1EF015B2210208ABCB14DF89CC81EEB77ADEF88754F158549BE08A7241C630F810CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 68%
                                  			E00419E8B(void* __eax, void* __edx, void* _a4) {
                                  				intOrPtr _v0;
                                  				void* _v117;
                                  				long _t12;
                                  				void* _t17;
                                  
                                  				_push(ds);
                                  				asm("clc");
                                  				_t9 = _v0;
                                  				_t4 = _t9 + 0x10; // 0x300
                                  				_t5 = _t9 + 0xc50; // 0x40a923
                                  				E0041A960(_t17, _v0, _t5,  *_t4, 0, 0x2c);
                                  				_t12 = NtClose(_a4); // executed
                                  				return _t12;
                                  			}







                                  0x00419e8b
                                  0x00419e8e
                                  0x00419e93
                                  0x00419e96
                                  0x00419e9f
                                  0x00419ea7
                                  0x00419eb5
                                  0x00419eb9

                                  APIs
                                  • NtClose.NTDLL(00414D20,?,?,00414D20,00409CD3,FFFFFFFF), ref: 00419EB5
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                  Yara matches
                                  Similarity
                                  • API ID: Close
                                  • String ID:
                                  • API String ID: 3535843008-0
                                  • Opcode ID: cf0f672d353e002e72ad141cda53237102e79150a8cae9d9140751f843d6c200
                                  • Instruction ID: 8f38fcf6b0397ca5aa72bb8df3f6d67340a75a13daa9779ab6b962be0ec2cbe0
                                  • Opcode Fuzzy Hash: cf0f672d353e002e72ad141cda53237102e79150a8cae9d9140751f843d6c200
                                  • Instruction Fuzzy Hash: 94E08C71200114AFD720DBA4CC86EEB7B29EF88760F158559F90CAB242C630E941CAD0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00419E90(intOrPtr _a4, void* _a8) {
                                  				long _t8;
                                  				void* _t11;
                                  
                                  				_t5 = _a4;
                                  				_t2 = _t5 + 0x10; // 0x300
                                  				_t3 = _t5 + 0xc50; // 0x40a923
                                  				E0041A960(_t11, _a4, _t3,  *_t2, 0, 0x2c);
                                  				_t8 = NtClose(_a8); // executed
                                  				return _t8;
                                  			}





                                  0x00419e93
                                  0x00419e96
                                  0x00419e9f
                                  0x00419ea7
                                  0x00419eb5
                                  0x00419eb9

                                  APIs
                                  • NtClose.NTDLL(00414D20,?,?,00414D20,00409CD3,FFFFFFFF), ref: 00419EB5
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                  Yara matches
                                  Similarity
                                  • API ID: Close
                                  • String ID:
                                  • API String ID: 3535843008-0
                                  • Opcode ID: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                  • Instruction ID: e68336ecf97fcbff1cce52d5eab911d0c0d253976a6ab71543f56f2ca0e2158f
                                  • Opcode Fuzzy Hash: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                  • Instruction Fuzzy Hash: 6CD012752002146BD710EB99CC85ED7776CEF44760F154459BA5C5B242C530F55086E0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: efcf0ab6665c7b0157fd04bcb744907f430064515781423b38bce05023b8fb6d
                                  • Instruction ID: 3804b4b6881f0f279124858c5e35b72bf87e4fbc11d5a75f000cd7e24852ad46
                                  • Opcode Fuzzy Hash: efcf0ab6665c7b0157fd04bcb744907f430064515781423b38bce05023b8fb6d
                                  • Instruction Fuzzy Hash: 64213CB2D4020857CB25D664AD42AEF737CEB54308F04017FE949A3182F7387E49CBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0041A070(intOrPtr _a4, void* _a8, long _a12, void* _a16) {
                                  				char _t10;
                                  				void* _t15;
                                  
                                  				_t3 = _a4 + 0xc74; // 0xc74
                                  				E0041A960(_t15, _a4, _t3,  *((intOrPtr*)(_a4 + 0x10)), 0, 0x35);
                                  				_t10 = RtlFreeHeap(_a8, _a12, _a16); // executed
                                  				return _t10;
                                  			}





                                  0x0041a07f
                                  0x0041a087
                                  0x0041a09d
                                  0x0041a0a1

                                  APIs
                                  • RtlFreeHeap.NTDLL(00000060,00409CD3,?,?,00409CD3,00000060,00000000,00000000,?,?,00409CD3,?,00000000), ref: 0041A09D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                  Yara matches
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID:
                                  • API String ID: 3298025750-0
                                  • Opcode ID: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                  • Instruction ID: ebe44f756a2289fd31ae4d5b5361048190c1dc89d00c79db85c43397b2838655
                                  • Opcode Fuzzy Hash: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                  • Instruction Fuzzy Hash: 81E01AB12102086BD714DF59CC45EA777ACEF88750F018559B90857241C630E9108AB0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 75%
                                  			E0041A030(void* __esi, intOrPtr _a4, void* _a8, long _a12, long _a16) {
                                  				void* _t10;
                                  				void* _t15;
                                  
                                  				_t7 = _a4;
                                  				E0041A960(_t15, _a4, _a4 + 0xc70,  *((intOrPtr*)(_t7 + 0x10)), 0, 0x34);
                                  				_t10 = RtlAllocateHeap(_a8, _a12, _a16);
                                  				asm("rcr byte [esi+0x5d], cl");
                                  				return _t10;
                                  			}





                                  0x0041a033
                                  0x0041a047
                                  0x0041a05d
                                  0x0041a05e
                                  0x0041a061

                                  APIs
                                  • RtlAllocateHeap.NTDLL(00414506,?,00414C7F,00414C7F,?,00414506,?,?,?,?,?,00000000,00409CD3,?), ref: 0041A05D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                  • Instruction ID: 0bf4e0d92ddb4de2ba6a166865ddf054dca1a4f918bcd24d9368b88a9b8aca1a
                                  • Opcode Fuzzy Hash: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                  • Instruction Fuzzy Hash: F1E012B1210208ABDB14EF99CC81EA777ACEF88664F158559BA086B242C630F9108AB0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Non-executed Functions

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: l
                                  • API String ID: 0-2517025534
                                  • Opcode ID: 17d8e7beda2a7b736129abd332eb3eba09e038a615ccef6e2c63008a673c0ebd
                                  • Instruction ID: cef014c1f9cd92ab3866c19fe40b7abd36249d8e8e0eba0d023945b49e0d3d07
                                  • Opcode Fuzzy Hash: 17d8e7beda2a7b736129abd332eb3eba09e038a615ccef6e2c63008a673c0ebd
                                  • Instruction Fuzzy Hash: 9DE0CA21E1C20B05DB113D7C50C09F1BF60C753328FD025F6D8D147563ED46E42540C8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f1ddde2ae6b9ee040522767a3f4f6a305586bf8f5eca8ff2599eaf3588e62c2
                                  • Instruction ID: 845bdd9e0341ab6f1dbfbaf3276d700b6c8da5fca1adaefe35aec1f8fcc0339f
                                  • Opcode Fuzzy Hash: 1f1ddde2ae6b9ee040522767a3f4f6a305586bf8f5eca8ff2599eaf3588e62c2
                                  • Instruction Fuzzy Hash: D0C08C4BF0D00C0280289C4928052B8F330EA93061F713BAECF9AB3E026002C26702CD
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.374677540.0000000000400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eb42e1a1fb6c275983bf4fa19bc02d6b96d1aa3b9eafafd37984e8a68cac8b1b
                                  • Instruction ID: 84734e3053018c9f520188b080d53d37aeb879e7c76ad4f49a7d7ab9ef2bdd8f
                                  • Opcode Fuzzy Hash: eb42e1a1fb6c275983bf4fa19bc02d6b96d1aa3b9eafafd37984e8a68cac8b1b
                                  • Instruction Fuzzy Hash: 95C08C07B0828815C7491E6EB4021B2FB29A3C3432F44B3EACE4EA7051AE17882082D9
                                  Uniqueness

                                  Uniqueness Score: -1.00%