Loading ...

Play interactive tourEdit tour

Windows Analysis Report bhjRru88ej

Overview

General Information

Sample Name:bhjRru88ej (renamed file extension from none to exe)
Analysis ID:532826
MD5:3461688b684c14bfa1b81f1a110254e4
SHA1:70269a15f2b27f2a3a33a4028d7aeb2e1094db58
SHA256:5869ff09468b1aafa73c0a8fa15c953995495aa7144114003fdc4743860639ad
Tags:32exetrojan
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Self deletion via cmd delete
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w10x64
  • bhjRru88ej.exe (PID: 5244 cmdline: "C:\Users\user\Desktop\bhjRru88ej.exe" MD5: 3461688B684C14BFA1B81F1A110254E4)
    • bhjRru88ej.exe (PID: 5228 cmdline: "C:\Users\user\Desktop\bhjRru88ej.exe" MD5: 3461688B684C14BFA1B81F1A110254E4)
      • explorer.exe (PID: 3440 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • colorcpl.exe (PID: 5620 cmdline: C:\Windows\SysWOW64\colorcpl.exe MD5: 746F3B5E7652EA0766BA10414D317981)
          • cmd.exe (PID: 6136 cmdline: /c del "C:\Users\user\Desktop\bhjRru88ej.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 3232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • explorer.exe (PID: 3864 cmdline: "C:\Windows\explorer.exe" /LOADSAVEDWINDOWS MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.drmichaelirvine.com/yrcy/"], "decoy": ["ordermws-brands.com", "jkbswj.com", "dairatwsl.com", "lewismiddleton.com", "hevenorfeed.com", "kovogueshop.com", "cyberitconsultingz.com", "besrbee.com", "workerscompfl1.com", "wayfinderacu.com", "smplkindness.com", "servicesitcy.com", "babyvv.com", "fly-crypto.com", "chahuima.com", "trist-n.tech", "minjia56.com", "oded.top", "mes-dents-blanches.com", "nethunsleather.com", "onlinesindh.com", "genrage.com", "bhalawat.com", "5gwirelesszone.com", "semejnyjochag.com", "shopvintageallure.com", "laqueenbeautybar.supplies", "hominyprintingmuseum.com", "taksimbet13.com", "fairytalesinc.com", "loversscout.com", "nxn-n.com", "lovebydarius.store", "mintnft.tours", "snowjamproductiosmedia.com", "boraviajar.website", "cryptointelcenter.com", "m2momshealth.com", "perfectionbyinjection.com", "cletechsolutions.com", "skin4trade.com", "a9d7c19f0282.com", "waltersswholesale.com", "lendsoar.com", "virginialandsforsale.com", "shinepatio.com", "nba2klocker.team", "picturebookoriginals.com", "chatteusa.com", "bodevolidu.quest", "certidaoja.com", "scgxjp.com", "cbd-cannabis-store.com", "kadinisigi.com", "vacoveco.com", "hostedexchangemaintainces.com", "hf59184.com", "jingguanfm.com", "browsealto.com", "kymyra.com", "xrgoods.com", "dtsddcpj.com", "uptimisedmc.com", "redsigndesign.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8618:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x89b2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x146c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x141b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x147c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1493f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x93ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1342c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa142:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19bb7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ac5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x16ae9:$sqlite3step: 68 34 1C 7B E1
    • 0x16bfc:$sqlite3step: 68 34 1C 7B E1
    • 0x16b18:$sqlite3text: 68 38 2A 90 C5
    • 0x16c3d:$sqlite3text: 68 38 2A 90 C5
    • 0x16b2b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16c53:$sqlite3blob: 68 53 D8 7F 8C
    00000001.00000002.413560341.00000000009D0000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000001.00000002.413560341.00000000009D0000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8618:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x89b2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x146c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x141b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x147c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1493f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x93ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1342c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa142:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x19bb7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1ac5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 31 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      1.1.bhjRru88ej.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        1.1.bhjRru88ej.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8618:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x89b2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x146c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x141b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x147c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1493f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x93ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1342c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa142:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x19bb7:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1ac5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        1.1.bhjRru88ej.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x16ae9:$sqlite3step: 68 34 1C 7B E1
        • 0x16bfc:$sqlite3step: 68 34 1C 7B E1
        • 0x16b18:$sqlite3text: 68 38 2A 90 C5
        • 0x16c3d:$sqlite3text: 68 38 2A 90 C5
        • 0x16b2b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x16c53:$sqlite3blob: 68 53 D8 7F 8C
        1.0.bhjRru88ej.exe.400000.2.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          1.0.bhjRru88ej.exe.400000.2.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x7818:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x7bb2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x138c5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x133b1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x139c7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x13b3f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x85ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1262c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x9342:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x18db7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x19e5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 28 entries

          Sigma Overview

          No Sigma rule has matched

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.drmichaelirvine.com/yrcy/"], "decoy": ["ordermws-brands.com", "jkbswj.com", "dairatwsl.com", "lewismiddleton.com", "hevenorfeed.com", "kovogueshop.com", "cyberitconsultingz.com", "besrbee.com", "workerscompfl1.com", "wayfinderacu.com", "smplkindness.com", "servicesitcy.com", "babyvv.com", "fly-crypto.com", "chahuima.com", "trist-n.tech", "minjia56.com", "oded.top", "mes-dents-blanches.com", "nethunsleather.com", "onlinesindh.com", "genrage.com", "bhalawat.com", "5gwirelesszone.com", "semejnyjochag.com", "shopvintageallure.com", "laqueenbeautybar.supplies", "hominyprintingmuseum.com", "taksimbet13.com", "fairytalesinc.com", "loversscout.com", "nxn-n.com", "lovebydarius.store", "mintnft.tours", "snowjamproductiosmedia.com", "boraviajar.website", "cryptointelcenter.com", "m2momshealth.com", "perfectionbyinjection.com", "cletechsolutions.com", "skin4trade.com", "a9d7c19f0282.com", "waltersswholesale.com", "lendsoar.com", "virginialandsforsale.com", "shinepatio.com", "nba2klocker.team", "picturebookoriginals.com", "chatteusa.com", "bodevolidu.quest", "certidaoja.com", "scgxjp.com", "cbd-cannabis-store.com", "kadinisigi.com", "vacoveco.com", "hostedexchangemaintainces.com", "hf59184.com", "jingguanfm.com", "browsealto.com", "kymyra.com", "xrgoods.com", "dtsddcpj.com", "uptimisedmc.com", "redsigndesign.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: bhjRru88ej.exeVirustotal: Detection: 18%Perma Link
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 1.1.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.bhjRru88ej.exe.25d0000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.1.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.bhjRru88ej.exe.25d0000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.413560341.00000000009D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.384139517.00000000075EE000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.397566356.00000000075EE000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.353597466.00000000025D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.413505967.00000000005C0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.630654958.0000000002FB0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.413413880.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.350595433.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000001.352601050.0000000000400000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.351883848.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.630203304.0000000002EB0000.00000040.00020000.sdmp, type: MEMORY
          Multi AV Scanner detection for domain / URLShow sources
          Source: www.drmichaelirvine.com/yrcy/Virustotal: Detection: 6%Perma Link
          Source: 20.0.explorer.exe.ba3796c.0.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: 1.0.bhjRru88ej.exe.400000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 1.2.bhjRru88ej.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 1.0.bhjRru88ej.exe.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 1.1.bhjRru88ej.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 9.2.colorcpl.exe.539796c.4.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: 1.0.bhjRru88ej.exe.400000.0.unpackAvira: Label: TR/Patched.Ren.Gen2
          Source: 0.2.bhjRru88ej.exe.25d0000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 9.2.colorcpl.exe.ca3240.1.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: 1.0.bhjRru88ej.exe.400000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: bhjRru88ej.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: Binary string: colorcpl.pdbGCTL source: bhjRru88ej.exe, 00000001.00000002.413982795.0000000002620000.00000040.00020000.sdmp
          Source: Binary string: colorcpl.pdb source: bhjRru88ej.exe, 00000001.00000002.413982795.0000000002620000.00000040.00020000.sdmp
          Source: Binary string: wntdll.pdbUGP source: bhjRru88ej.exe, 00000000.00000003.351975445.0000000002A40000.00000004.00000001.sdmp, bhjRru88ej.exe, 00000000.00000003.348870904.0000000002BD0000.00000004.00000001.sdmp, bhjRru88ej.exe, 00000001.00000002.413692176.0000000000B1F000.00000040.00000001.sdmp, bhjRru88ej.exe, 00000001.00000002.413582954.0000000000A00000.00000040.00000001.sdmp, colorcpl.exe, 00000009.00000003.414557040.0000000004CC0000.00000004.00000001.sdmp, colorcpl.exe, 00000009.00000002.631312735.0000000004E60000.00000040.00000001.sdmp, colorcpl.exe, 00000009.00000002.631731697.0000000004F7F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: bhjRru88ej.exe, bhjRru88ej.exe, 00000001.00000002.413692176.0000000000B1F000.00000040.00000001.sdmp, bhjRru88ej.exe, 00000001.00000002.413582954.0000000000A00000.00000040.00000001.sdmp, colorcpl.exe, colorcpl.exe, 00000009.00000003.414557040.0000000004CC0000.00000004.00000001.sdmp, colorcpl.exe, 00000009.00000002.631312735.0000000004E60000.00000040.00000001.sdmp, colorcpl.exe, 00000009.00000002.631731697.0000000004F7F000.00000040.00000001.sdmp
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_00405250 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_00405C22 FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_00402630 FindFirstFileA,

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.drmichaelirvine.com/yrcy/
          Source: explorer.exe, 00000014.00000003.539787006.0000000008AB2000.00000004.00000001.sdmp, explorer.exe, 00000014.00000003.537714824.0000000008B04000.00000004.00000001.sdmp, explorer.exe, 00000014.00000003.539938122.0000000008ADA000.00000004.00000001.sdmp, explorer.exe, 00000014.00000003.539100134.0000000008A67000.00000004.00000001.sdmp, explorer.exe, 00000014.00000003.539419599.0000000008A67000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.c
          Source: explorer.exe, 00000014.00000000.544421552.0000000008901000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: explorer.exe, 00000014.00000003.537975097.0000000008A74000.00000004.00000001.sdmp, explorer.exe, 00000014.00000003.538324654.0000000008ADA000.00000004.00000001.sdmpString found in binary or memory: http://logo.verisign
          Source: explorer.exe, 00000014.00000000.523416235.000000000347F000.00000004.00000001.sdmpString found in binary or memory: http://nsdobe.cM
          Source: bhjRru88ej.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: bhjRru88ej.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: explorer.exe, 00000004.00000000.390882431.000000000095C000.00000004.00000020.sdmp, explorer.exe, 00000004.00000000.376768523.000000000095C000.00000004.00000020.sdmp, explorer.exe, 00000004.00000000.355838675.000000000095C000.00000004.00000020.sdmp, explorer.exe, 00000004.00000000.459181418.000000000095C000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: bhjRru88ej.exe, 00000000.00000002.353234862.000000000078A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_00404E07 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 1.1.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.bhjRru88ej.exe.25d0000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.1.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.bhjRru88ej.exe.25d0000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.413560341.00000000009D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.384139517.00000000075EE000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.397566356.00000000075EE000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.353597466.00000000025D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.413505967.00000000005C0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.630654958.0000000002FB0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.413413880.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.350595433.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000001.352601050.0000000000400000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.351883848.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.630203304.0000000002EB0000.00000040.00020000.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 1.1.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.1.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.bhjRru88ej.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.bhjRru88ej.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.bhjRru88ej.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.bhjRru88ej.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.bhjRru88ej.exe.25d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.bhjRru88ej.exe.25d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.1.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.1.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.bhjRru88ej.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.bhjRru88ej.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.bhjRru88ej.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.bhjRru88ej.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.bhjRru88ej.exe.25d0000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.bhjRru88ej.exe.25d0000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.bhjRru88ej.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.bhjRru88ej.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.413560341.00000000009D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.413560341.00000000009D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.384139517.00000000075EE000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.384139517.00000000075EE000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.397566356.00000000075EE000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.397566356.00000000075EE000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.353597466.00000000025D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.353597466.00000000025D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.413505967.00000000005C0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.413505967.00000000005C0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.630654958.0000000002FB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.630654958.0000000002FB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.413413880.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.413413880.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000000.350595433.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000000.350595433.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000001.352601050.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000001.352601050.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000000.351883848.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000000.351883848.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.630203304.0000000002EB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.630203304.0000000002EB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: bhjRru88ej.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: 1.1.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.1.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.bhjRru88ej.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.bhjRru88ej.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.bhjRru88ej.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.bhjRru88ej.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.bhjRru88ej.exe.25d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.bhjRru88ej.exe.25d0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.1.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.1.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.bhjRru88ej.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.bhjRru88ej.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.bhjRru88ej.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.bhjRru88ej.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.bhjRru88ej.exe.25d0000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.bhjRru88ej.exe.25d0000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.bhjRru88ej.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.bhjRru88ej.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.413560341.00000000009D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.413560341.00000000009D0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.384139517.00000000075EE000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.384139517.00000000075EE000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.397566356.00000000075EE000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.397566356.00000000075EE000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.353597466.00000000025D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.353597466.00000000025D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.413505967.00000000005C0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.413505967.00000000005C0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.630654958.0000000002FB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.630654958.0000000002FB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.413413880.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.413413880.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000000.350595433.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000000.350595433.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000001.352601050.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000001.352601050.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000000.351883848.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000000.351883848.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.630203304.0000000002EB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.630203304.0000000002EB0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_004030E3 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_00406043
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_00404618
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_0040681A
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_10017011
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_1001F026
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_100210E3
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_1001FD40
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_1001C18E
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_1001F598
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_10015E9B
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_1001EAB4
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_1001638F
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_100167A7
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_10016BDC
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00401030
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041C0E1
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041C985
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041BA8F
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041C37B
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041CBED
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041C45D
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00408C8B
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00408C90
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00402D88
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00402D90
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041C75C
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00402FB0
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A520A0
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF20A8
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3B090
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1002
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A44120
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2F900
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF22AE
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5EBB0
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AEDBD2
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF2B28
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3841F
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A52581
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3D5E0
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A20D20
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF2D07
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF1D55
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF2EF7
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A46E30
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF1FF1
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_00401030
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041C0E1
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041C985
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041BA8F
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041C37B
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041CBED
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041C45D
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_00408C8B
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_00408C90
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_00402D88
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_00402D90
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F528EC
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB20A0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F520A8
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E9B090
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F4D466
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41002
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E9841F
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E9D5E0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F525DD
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB2581
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F51D55
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E80D20
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EA4120
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8F900
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F52D07
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F52EF7
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F522AE
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EA6E30
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F51FF1
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F4DBD2
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBEBB0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F52B28
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FCCBED
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FCC0D9
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FCC985
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FB2FB0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FCC75C
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FB8C90
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FB8C8B
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FCC45D
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FB2D90
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FB2D88
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 04E8B150 appears 35 times
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: String function: 0041A3A0 appears 36 times
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: String function: 00A2B150 appears 35 times
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_004185F0 NtCreateFile,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_004186A0 NtReadFile,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00418720 NtClose,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_004187D0 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_004185EE NtCreateFile,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041871C NtClose,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A698F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A699A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A695D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A696E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A697A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A698A0 NtWriteVirtualMemory,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69820 NtEnumerateKey,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A6B040 NtSuspendThread,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A699D0 NtCreateProcessEx,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69950 NtQueueApcThread,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69A80 NtOpenDirectoryObject,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69A10 NtQuerySection,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A6A3B0 NtGetContextThread,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69B00 NtSetValueKey,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A695F0 NtQueryInformationFile,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69520 NtWaitForSingleObject,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A6AD30 NtSetContextThread,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69560 NtWriteFile,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A696D0 NtCreateKey,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69610 NtEnumerateValueKey,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69670 NtQueryInformationProcess,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69650 NtQueryValueKey,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69730 NtQueryVirtualMemory,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A6A710 NtOpenProcessToken,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69760 NtOpenProcess,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A69770 NtSetInformationFile,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A6A770 NtOpenThread,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_004185F0 NtCreateFile,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_004186A0 NtReadFile,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_00418720 NtClose,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_004187D0 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_004185EE NtCreateFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC95D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC96D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC98F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC98A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04ECB040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC95F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC99D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9560 NtWriteFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04ECAD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC97A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04ECA3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04ECA770 NtOpenThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC9B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04ECA710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FC86A0 NtReadFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FC87D0 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FC8720 NtClose,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FC85F0 NtCreateFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FC871C NtClose,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FC85EE NtCreateFile,
          Source: bhjRru88ej.exe, 00000000.00000003.352137303.0000000002B56000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs bhjRru88ej.exe
          Source: bhjRru88ej.exe, 00000000.00000003.350119568.0000000002CEF000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs bhjRru88ej.exe
          Source: bhjRru88ej.exe, 00000001.00000002.413841134.0000000000CAF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs bhjRru88ej.exe
          Source: bhjRru88ej.exe, 00000001.00000002.413692176.0000000000B1F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs bhjRru88ej.exe
          Source: bhjRru88ej.exe, 00000001.00000002.413989147.0000000002623000.00000040.00020000.sdmpBinary or memory string: OriginalFilenamecolorcpl.exej% vs bhjRru88ej.exe
          Source: bhjRru88ej.exeVirustotal: Detection: 18%
          Source: C:\Users\user\Desktop\bhjRru88ej.exeFile read: C:\Users\user\Desktop\bhjRru88ej.exeJump to behavior
          Source: bhjRru88ej.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\bhjRru88ej.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\bhjRru88ej.exe "C:\Users\user\Desktop\bhjRru88ej.exe"
          Source: C:\Users\user\Desktop\bhjRru88ej.exeProcess created: C:\Users\user\Desktop\bhjRru88ej.exe "C:\Users\user\Desktop\bhjRru88ej.exe"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\SysWOW64\colorcpl.exe
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\bhjRru88ej.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\explorer.exe "C:\Windows\explorer.exe" /LOADSAVEDWINDOWS
          Source: C:\Users\user\Desktop\bhjRru88ej.exeProcess created: C:\Users\user\Desktop\bhjRru88ej.exe "C:\Users\user\Desktop\bhjRru88ej.exe"
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\bhjRru88ej.exe"
          Source: C:\Users\user\Desktop\bhjRru88ej.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
          Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.3.ver0x0000000000000015.dbJump to behavior
          Source: C:\Users\user\Desktop\bhjRru88ej.exeFile created: C:\Users\user\AppData\Local\Temp\nscC64C.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@8/2@0/0
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_00402012 CoCreateInstance,MultiByteToWideChar,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_0040411B GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\explorer.exe
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: Binary string: colorcpl.pdbGCTL source: bhjRru88ej.exe, 00000001.00000002.413982795.0000000002620000.00000040.00020000.sdmp
          Source: Binary string: colorcpl.pdb source: bhjRru88ej.exe, 00000001.00000002.413982795.0000000002620000.00000040.00020000.sdmp
          Source: Binary string: wntdll.pdbUGP source: bhjRru88ej.exe, 00000000.00000003.351975445.0000000002A40000.00000004.00000001.sdmp, bhjRru88ej.exe, 00000000.00000003.348870904.0000000002BD0000.00000004.00000001.sdmp, bhjRru88ej.exe, 00000001.00000002.413692176.0000000000B1F000.00000040.00000001.sdmp, bhjRru88ej.exe, 00000001.00000002.413582954.0000000000A00000.00000040.00000001.sdmp, colorcpl.exe, 00000009.00000003.414557040.0000000004CC0000.00000004.00000001.sdmp, colorcpl.exe, 00000009.00000002.631312735.0000000004E60000.00000040.00000001.sdmp, colorcpl.exe, 00000009.00000002.631731697.0000000004F7F000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: bhjRru88ej.exe, bhjRru88ej.exe, 00000001.00000002.413692176.0000000000B1F000.00000040.00000001.sdmp, bhjRru88ej.exe, 00000001.00000002.413582954.0000000000A00000.00000040.00000001.sdmp, colorcpl.exe, colorcpl.exe, 00000009.00000003.414557040.0000000004CC0000.00000004.00000001.sdmp, colorcpl.exe, 00000009.00000002.631312735.0000000004E60000.00000040.00000001.sdmp, colorcpl.exe, 00000009.00000002.631731697.0000000004F7F000.00000040.00000001.sdmp
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_1001B185 push ecx; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041B832 push eax; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041B83B push eax; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041B8C9 push eax; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041B8C9 push eax; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041B89C push eax; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041A14C push edx; iretd
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041A9F5 push ss; retf
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041C985 push 2E33947Ah; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041526B push es; retf
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0040C30E pushad ; iretd
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041CBED push 2E33947Ah; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041D466 push 80958155h; iretd
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00415C32 push ecx; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_0041B7E5 push eax; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A7D0D1 push ecx; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041B832 push eax; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041B83B push eax; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041B8C9 push eax; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041B8C9 push eax; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041B89C push eax; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041A14C push edx; iretd
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041A9F5 push ss; retf
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041C985 push 2E33947Ah; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041526B push es; retf
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0040C30E pushad ; iretd
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041CBED push 2E33947Ah; ret
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_0041D466 push 80958155h; iretd
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_1_00415C32 push ecx; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EDD0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_02FC526B push es; retf
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_00405C49 GetModuleHandleA,LoadLibraryA,GetProcAddress,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeFile created: C:\Users\user\AppData\Local\Temp\nsnC68C.tmp\kxovistzen.dllJump to dropped file

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Self deletion via cmd deleteShow sources
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: /c del "C:\Users\user\Desktop\bhjRru88ej.exe"
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: /c del "C:\Users\user\Desktop\bhjRru88ej.exe"
          Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\bhjRru88ej.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\bhjRru88ej.exeRDTSC instruction interceptor: First address: 0000000000408614 second address: 000000000040861A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\bhjRru88ej.exeRDTSC instruction interceptor: First address: 00000000004089AE second address: 00000000004089B4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\colorcpl.exeRDTSC instruction interceptor: First address: 0000000002FB8614 second address: 0000000002FB861A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\colorcpl.exeRDTSC instruction interceptor: First address: 0000000002FB89AE second address: 0000000002FB89B4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_004088E0 rdtsc
          Source: C:\Windows\explorer.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#5&1ec51bf7&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\bhjRru88ej.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_00405250 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_00405C22 FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_00402630 FindFirstFileA,
          Source: explorer.exe, 00000004.00000000.367808794.00000000083E9000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00dRom0
          Source: explorer.exe, 00000014.00000000.544421552.0000000008901000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000014.00000000.537491509.0000000005390000.00000004.00000001.sdmpBinary or memory string: k\\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}`t
          Source: explorer.exe, 00000014.00000003.520182409.0000000004DC3000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000014.00000003.576819870.0000000008A13000.00000004.00000001.sdmpBinary or memory string: \REGISTRY\USER\S-1-5-21-3853321935-2125563209-4053062332-1002_Classes\CLSID\{116F8D13-101E-4fa5-84D4-FF8279381935}\InProcServer32olume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA
          Source: explorer.exe, 00000014.00000003.545753517.0000000008A18000.00000004.00000001.sdmpBinary or memory string: 8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA
          Source: explorer.exe, 00000004.00000000.358736890.00000000062E0000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000014.00000003.565224749.0000000008B60000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B-
          Source: explorer.exe, 00000014.00000003.543458265.0000000008B24000.00000004.00000001.sdmpBinary or memory string: -1-5-21-3853321935-2125563209-4053062332-1002_Classes\CLSID\{1A1F4206-0688-4E7F-BE03-D82EC69DF9A5}\InprocHandler320000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f-
          Source: explorer.exe, 00000014.00000003.542471214.0000000008A10000.00000004.00000001.sdmpBinary or memory string: 53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&VY
          Source: explorer.exe, 00000014.00000003.566270874.0000000010CF8000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
          Source: explorer.exe, 00000014.00000003.539419599.0000000008A67000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: explorer.exe, 00000014.00000003.544656638.0000000008B27000.00000004.00000001.sdmpBinary or memory string: dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}L=6PROCESSOR_REVISION=5507BY
          Source: explorer.exe, 00000014.00000003.576819870.0000000008A13000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}wsApps3
          Source: explorer.exe, 00000014.00000000.545321927.0000000008B27000.00000004.00000001.sdmpBinary or memory string: 53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}L=6PROCESSOR_REVISION=5507BY
          Source: explorer.exe, 00000014.00000003.544656638.0000000008B27000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Users
          Source: explorer.exe, 00000014.00000003.576819870.0000000008A13000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ws
          Source: explorer.exe, 00000014.00000000.584357358.0000000001397000.00000004.00000020.sdmpBinary or memory string: ECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&00
          Source: explorer.exe, 00000014.00000003.520182409.0000000004DC3000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}>\
          Source: explorer.exe, 00000014.00000003.572882229.0000000008B15000.00000004.00000001.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&
          Source: explorer.exe, 00000014.00000003.576819870.0000000008A13000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}dulePat
          Source: bhjRru88ej.exe, 00000000.00000002.353234862.000000000078A000.00000004.00000020.sdmpBinary or memory string: zSCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:Qcpp
          Source: explorer.exe, 00000014.00000000.544732982.00000000089CF000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000014.00000003.535114938.00000000089D2000.00000004.00000001.sdmpBinary or memory string: ;;SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000004.00000000.367808794.00000000083E9000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000014.00000003.572882229.0000000008B15000.00000004.00000001.sdmpBinary or memory string: ar&_VMware_SATA_CD00#5&280b
          Source: explorer.exe, 00000014.00000003.562081902.000000001115E000.00000004.00000001.sdmpBinary or memory string: -98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B:
          Source: explorer.exe, 00000004.00000000.367696418.00000000082E2000.00000004.00000001.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Y
          Source: explorer.exe, 00000014.00000000.544732982.00000000089CF000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00IC
          Source: explorer.exe, 00000014.00000003.535114938.00000000089D2000.00000004.00000001.sdmpBinary or memory string: AASCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 00000014.00000003.562081902.000000001115E000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BO
          Source: explorer.exe, 00000014.00000003.576819870.0000000008A13000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}O
          Source: explorer.exe, 00000004.00000000.367696418.00000000082E2000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
          Source: explorer.exe, 00000014.00000000.544732982.00000000089CF000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}er.Hu
          Source: explorer.exe, 00000014.00000000.560009880.000000001115C000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B:
          Source: explorer.exe, 00000014.00000000.544624794.00000000089A2000.00000004.00000001.sdmpBinary or memory string: VMware SATA CD00ngs
          Source: explorer.exe, 00000014.00000003.572882229.0000000008B15000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA(
          Source: explorer.exe, 00000014.00000003.542471214.0000000008A10000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
          Source: explorer.exe, 00000014.00000000.588943412.0000000004D82000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: explorer.exe, 00000004.00000000.385442909.0000000008430000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000-;
          Source: explorer.exe, 00000004.00000000.459181418.000000000095C000.00000004.00000020.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}G
          Source: explorer.exe, 00000014.00000003.562081902.000000001115E000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B@
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_1001B9E7 IsDebuggerPresent,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_10019B8A EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_00405C49 GetModuleHandleA,LoadLibraryA,GetProcAddress,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_10007CE0 SetEnhMetaFileBits,SetWinMetaFileBits,GetDC,CreateDIBitmap,ReleaseDC,GetProcessHeap,HeapFree,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_004088E0 rdtsc
          Source: C:\Users\user\Desktop\bhjRru88ej.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_0019EC20 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_0019E8DE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_0019EAF2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_0019EBA3 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_0019EBE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A690AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A29080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A258EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ABB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ABB8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ABB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ABB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ABB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ABB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A40050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A40050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A561A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A561A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A4C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A52990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AB41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A44120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A44120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A44120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A44120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A44120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A29100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A29100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A29100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A4B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A4B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A52AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A52ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A64A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A64A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A38A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A25210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A25210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A25210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A25210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A43A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ADB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ADB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A6927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A29240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A29240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A29240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A29240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AB4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A54BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A54BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A54BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A31B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A31B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ADD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A52397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A4DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A53B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A53B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A4746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ABC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ABC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A535A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A51DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A51DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A51DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A52581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A52581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A52581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A52581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A22D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A22D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A22D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A22D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A22D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AEFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AEFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AEFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AEFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AD8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA6DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A33D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AAA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A54D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A54D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A54D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A4C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A4C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A63D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A47D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ABFE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A376E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A516E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A68EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A536CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ADFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ADFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A2C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A58E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AE1608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A4AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A4AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A4AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A4AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A4AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A37E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A37E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A37E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A37E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A37E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A37E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A38794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AA7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A637F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A24F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A24F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A5A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A4F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ABFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00ABFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00AF8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00A3EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F06CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F06CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F06CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E858EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F414FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F1B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F1B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F58CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E89080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E9849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F03884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F03884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F51074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F42073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EA746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F1C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F1C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EA0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EA0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E9B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E9B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E9B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E9B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F54015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F54015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F07016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F07016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F07016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F5740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F5740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F5740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F06C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F06C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F06C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F06C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F38DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E9D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E9D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F4FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F4FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F4FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F4FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F141E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F06DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F06DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F06DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F06DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F06DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F06DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F051BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F069A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F505AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F505AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E82D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E82D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E82D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E82D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E82D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EAC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EAC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EAC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EAB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EAB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F03540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EA7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F58D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F0A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EA4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EA4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EA4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EA4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EA4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F4E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E93D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E89100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E89100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E89100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E976E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F58ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC8EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F3FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E852A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F50EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F50EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F50EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F046A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E9AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E9AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F1FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E9766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F3B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F3B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F58A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EAAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EAAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EAAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EAAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EAAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F4EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F14257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E89240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E89240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E89240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E89240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E97E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E97E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E97E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E97E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E97E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E97E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F4AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F4AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F3FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E98A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EA3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EBA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E85210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E85210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E85210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E85210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F41608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04E8AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EADBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EC37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F053CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F053CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04EB4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F55BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 9_2_04F07794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\bhjRru88ej.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 1_2_00409B50 LdrLoadDll,
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_1001B986 SetUnhandledExceptionFilter,UnhandledExceptionFilter,

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\bhjRru88ej.exeSection unmapped: C:\Windows\SysWOW64\colorcpl.exe base address: AC0000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\bhjRru88ej.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\bhjRru88ej.exeSection loaded: unknown target: C:\Windows\SysWOW64\colorcpl.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\bhjRru88ej.exeSection loaded: unknown target: C:\Windows\SysWOW64\colorcpl.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: unknown target: unknown protection: read write
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\bhjRru88ej.exeMemory written: C:\Users\user\Desktop\bhjRru88ej.exe base: 400000 value starts with: 4D5A
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\bhjRru88ej.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\bhjRru88ej.exeThread register set: target process: 3440
          Source: C:\Windows\SysWOW64\colorcpl.exeThread register set: target process: 3440
          Source: C:\Windows\SysWOW64\colorcpl.exeThread register set: target process: 3864
          Source: C:\Users\user\Desktop\bhjRru88ej.exeProcess created: C:\Users\user\Desktop\bhjRru88ej.exe "C:\Users\user\Desktop\bhjRru88ej.exe"
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\bhjRru88ej.exe"
          Source: explorer.exe, 00000014.00000000.520207902.0000000001397000.00000004.00000020.sdmp, explorer.exe, 00000014.00000000.584357358.0000000001397000.00000004.00000020.sdmpBinary or memory string: Progman24@
          Source: colorcpl.exe, 00000009.00000002.630892401.0000000003710000.00000002.00020000.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000004.00000000.459465275.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000000.398639162.00000000083E9000.00000004.00000001.sdmp, explorer.exe, 00000004.00000000.392582707.0000000004F80000.00000004.00000001.sdmp, explorer.exe, 00000004.00000000.391133927.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000000.356150962.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000000.377379137.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000000.367808794.00000000083E9000.00000004.00000001.sdmp, colorcpl.exe, 00000009.00000002.630892401.0000000003710000.00000002.00020000.sdmp, explorer.exe, 00000014.00000000.520799861.000000000147E000.00000004.00000020.sdmp, explorer.exe, 00000014.00000000.522351385.0000000001A80000.00000002.00020000.sdmp, explorer.exe, 00000014.00000000.585119276.000000000147E000.00000004.00000020.sdmp, explorer.exe, 00000014.00000000.537878920.00000000055F0000.00000004.00000001.sdmp, explorer.exe, 00000014.00000000.591415559.00000000055F0000.00000004.00000001.sdmp, explorer.exe, 00000014.00000000.585769726.0000000001A80000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000004.00000000.459465275.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000000.376324112.00000000008B8000.00000004.00000020.sdmp, explorer.exe, 00000004.00000000.390761825.00000000008B8000.00000004.00000020.sdmp, explorer.exe, 00000004.00000000.391133927.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000000.355656357.00000000008B8000.00000004.00000020.sdmp, explorer.exe, 00000004.00000000.356150962.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000000.458866350.00000000008B8000.00000004.00000020.sdmp, explorer.exe, 00000004.00000000.377379137.0000000000EE0000.00000002.00020000.sdmp, colorcpl.exe, 00000009.00000002.630892401.0000000003710000.00000002.00020000.sdmp, explorer.exe, 00000014.00000000.522351385.0000000001A80000.00000002.00020000.sdmp, explorer.exe, 00000014.00000000.537878920.00000000055F0000.00000004.00000001.sdmp, explorer.exe, 00000014.00000000.591415559.00000000055F0000.00000004.00000001.sdmp, explorer.exe, 00000014.00000000.585769726.0000000001A80000.00000002.00020000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000014.00000000.537267605.0000000005333000.00000004.00000001.sdmp, explorer.exe, 00000014.00000000.590545780.0000000005333000.00000004.00000001.sdmpBinary or memory string: ProgmanD
          Source: explorer.exe, 00000004.00000000.459465275.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000000.391133927.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000000.356150962.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000000.377379137.0000000000EE0000.00000002.00020000.sdmpBinary or memory string: &Program Manager
          Source: explorer.exe, 00000004.00000000.459465275.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000000.391133927.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000000.356150962.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000000.377379137.0000000000EE0000.00000002.00020000.sdmp, explorer.exe, 00000014.00000000.522351385.0000000001A80000.00000002.00020000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000014.00000000.522351385.0000000001A80000.00000002.00020000.sdmp, explorer.exe, 00000014.00000000.585769726.0000000001A80000.00000002.00020000.sdmpBinary or memory string: }Program Manager
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_10018A2D cpuid
          Source: C:\Users\user\Desktop\bhjRru88ej.exeCode function: 0_2_0040594D GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 1.1.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.bhjRru88ej.exe.25d0000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.1.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.bhjRru88ej.exe.25d0000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.413560341.00000000009D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.384139517.00000000075EE000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.397566356.00000000075EE000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.353597466.00000000025D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.413505967.00000000005C0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.630654958.0000000002FB0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.413413880.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.350595433.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000001.352601050.0000000000400000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.351883848.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.630203304.0000000002EB0000.00000040.00020000.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 1.1.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.bhjRru88ej.exe.25d0000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.1.bhjRru88ej.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.bhjRru88ej.exe.25d0000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.bhjRru88ej.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.bhjRru88ej.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.413560341.00000000009D0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.384139517.00000000075EE000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.397566356.00000000075EE000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.353597466.00000000025D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.413505967.00000000005C0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.630654958.0000000002FB0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.413413880.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.350595433.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000001.352601050.0000000000400000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.351883848.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.630203304.0000000002EB0000.00000040.00020000.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsNative API1Path InterceptionProcess Injection512Masquerading1Input Capture1Query Registry1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
          Default AccountsShared Modules1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion2LSASS MemorySecurity Software Discovery161Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection512Security Account ManagerVirtualization/Sandbox Evasion2SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsFile and Directory Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing1Cached Domain CredentialsSystem Information Discovery113VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsFile Deletion1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 532826 Sample: bhjRru88ej Startdate: 02/12/2021 Architecture: WINDOWS Score: 100 30 Multi AV Scanner detection for domain / URL 2->30 32 Found malware configuration 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 3 other signatures 2->36 10 bhjRru88ej.exe 17 2->10         started        process3 file4 28 C:\Users\user\AppData\...\kxovistzen.dll, PE32 10->28 dropped 46 Tries to detect virtualization through RDTSC time measurements 10->46 48 Injects a PE file into a foreign processes 10->48 14 bhjRru88ej.exe 10->14         started        signatures5 process6 signatures7 50 Modifies the context of a thread in another process (thread injection) 14->50 52 Maps a DLL or memory area into another process 14->52 54 Sample uses process hollowing technique 14->54 56 Queues an APC in another process (thread injection) 14->56 17 explorer.exe 14->17 injected process8 process9 19 colorcpl.exe 17->19         started        signatures10 38 Self deletion via cmd delete 19->38 40 Modifies the context of a thread in another process (thread injection) 19->40 42 Maps a DLL or memory area into another process 19->42 44 Tries to detect virtualization through RDTSC time measurements 19->44 22 cmd.exe 1 19->22         started        24 explorer.exe 2 147 19->24         started        process11 process12 26 conhost.exe 22->26         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          bhjRru88ej.exe19%VirustotalBrowse

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          20.0.explorer.exe.ba3796c.0.unpack100%AviraTR/Patched.Ren.GenDownload File
          1.0.bhjRru88ej.exe.400000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          1.2.bhjRru88ej.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          1.0.bhjRru88ej.exe.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          1.1.bhjRru88ej.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          9.2.colorcpl.exe.539796c.4.unpack100%AviraTR/Patched.Ren.GenDownload File
          1.0.bhjRru88ej.exe.400000.0.unpack100%AviraTR/Patched.Ren.Gen2Download File
          0.2.bhjRru88ej.exe.25d0000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          9.2.colorcpl.exe.ca3240.1.unpack100%AviraTR/Patched.Ren.GenDownload File
          1.0.bhjRru88ej.exe.400000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://logo.verisign0%Avira URL Cloudsafe
          http://nsdobe.cM0%Avira URL Cloudsafe
          www.drmichaelirvine.com/yrcy/7%VirustotalBrowse
          www.drmichaelirvine.com/yrcy/0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          No contacted domains info

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          www.drmichaelirvine.com/yrcy/true
          • 7%, Virustotal, Browse
          • Avira URL Cloud: safe
          low

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000004.00000000.390882431.000000000095C000.00000004.00000020.sdmp, explorer.exe, 00000004.00000000.376768523.000000000095C000.00000004.00000020.sdmp, explorer.exe, 00000004.00000000.355838675.000000000095C000.00000004.00000020.sdmp, explorer.exe, 00000004.00000000.459181418.000000000095C000.00000004.00000020.sdmpfalse
            high
            http://logo.verisignexplorer.exe, 00000014.00000003.537975097.0000000008A74000.00000004.00000001.sdmp, explorer.exe, 00000014.00000003.538324654.0000000008ADA000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://nsis.sf.net/NSIS_ErrorbhjRru88ej.exefalse
              high
              http://nsis.sf.net/NSIS_ErrorErrorbhjRru88ej.exefalse
                high
                http://nsdobe.cMexplorer.exe, 00000014.00000000.523416235.000000000347F000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown

                Contacted IPs

                No contacted IP infos

                General Information

                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:532826
                Start date:02.12.2021
                Start time:18:24:23
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 10m 57s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:bhjRru88ej (renamed file extension from none to exe)
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:32
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:1
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@8/2@0/0
                EGA Information:Failed
                HDC Information:
                • Successful, ratio: 20.9% (good quality ratio 18.9%)
                • Quality average: 73.6%
                • Quality standard deviation: 31.9%
                HCA Information:
                • Successful, ratio: 92%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SearchUI.exe, backgroundTaskHost.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, ShellExperienceHost.exe, WMIADAP.exe, conhost.exe, svchost.exe, mobsync.exe, wuapihost.exe
                • Excluded IPs from analysis (whitelisted): 23.203.67.116
                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, www.bing.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, e1553.dspg.akamaiedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, cdn.onenote.net, arc.msn.com, cdn.onenote.net.edgekey.net
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtCreateFile calls found.
                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                • Report size getting too big, too many NtEnumerateKey calls found.
                • Report size getting too big, too many NtEnumerateValueKey calls found.
                • Report size getting too big, too many NtOpenFile calls found.
                • Report size getting too big, too many NtOpenKey calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryAttributesFile calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                18:26:39API Interceptor215x Sleep call for process: explorer.exe modified

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                No context

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Temp\aenx7c9gkk268
                Process:C:\Users\user\Desktop\bhjRru88ej.exe
                File Type:data
                Category:dropped
                Size (bytes):216882
                Entropy (8bit):7.994298787318829
                Encrypted:true
                SSDEEP:6144:6oIRGl0b+7GXCGwN5q8AJXj+yv6ZabXKtyKq:67oC+2zwN5QXYsbyyX
                MD5:11789F0E771071D04FD53F88297E2BAA
                SHA1:8DF23670A4919D8158AF1715B7F4E8A995B607C6
                SHA-256:F7CD00F4A19B9D6AC6B1DFBC1ADDB775089CB070580D7F41DE4190845FAB224C
                SHA-512:81DDADBE06EB66E1BC450F99607C1C02D8DE7A6AA1E8D228EBA66D7CD535D3E180C058E68C0F3AFF439D2DC26D34EDC32B33FFF5E295ACE639288625D4779B4F
                Malicious:false
                Reputation:low
                Preview: nI.z...v..{.Sy.....c...fq.0...bC^%E..*.w.....*..x..`P.E...q..h_.....|...fK..l.......#.....}y.B..z..R...$.Z4./.D.Ns..".2=;...t.w.....^..3.O:.i.b.Y....0..}...s.z[.s.Z...(....?'.._.w....K..=-&Dr'..H.i..&H'...4..L.y...>....zo........J/...`.*...Ot...d....v.6...Nc...c.s..(.?..bC^.E..*.w..@..*..x..`P.E.....h.Zf....#u..B.W......y.Dl...V..jY...(..HL..{b.gX_..j....".2=;.xR.......Z.t?.|b.~...S7...........c}./q.....P...]EC.?'=...'.~......=-&Dr'..&...;.R..R..4..L.yi.7>....zmJ......J/.f.`m*...Ot.r.D....v.J....Nc...crs.@.(.?>.bC^%E..*.w.....*..x..`P.E.....h.Zf....#u..B.W......y.Dl...V..jY...(..HL..{b.gX_..j....".2=;.xR.......Z.t?.|b.~...S7...........c}./q.....P..(....?'.._.'W~..I|...=-&Dr'..&...;.&.....4..L.yi.7>....zmJ......J/.f.`m*...Ot.r.D....v.J....Nc...crs.@.(.?>.bC^%E..*.w.....*..x..`P.E.....h.Zf....#u..B.W......y.Dl...V..jY...(..HL..{b.gX_..j....".2=;.xR.......Z.t?.|b.~...S7...........c}./q.....P..(....?'.._.'W~..I|...=-&Dr'..&...;.&.....4..L.yi.7>....
                C:\Users\user\AppData\Local\Temp\nsnC68C.tmp\kxovistzen.dll
                Process:C:\Users\user\Desktop\bhjRru88ej.exe
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):165376
                Entropy (8bit):6.376526911061105
                Encrypted:false
                SSDEEP:3072:kS/gkndx2PJh/XkkJJD10jpEj86LoTGUjc9:kS4k4dX7JD10j2wG
                MD5:CA01E724A81B69E7CF6613D5706917CD
                SHA1:C27C4C7F355A9B8C753D0072D8995369E70D7690
                SHA-256:602EA8D52A0CDFE9B88E865BC189728DA8DA59454C84C7F2BCF1AE93010FF6C6
                SHA-512:326DE45294389F846A30C36B0294E750304BF7C1F3730DBEFEE57224824F6D1CC2832CD4E025FF6B64C38EE56FE4DBF39A8E82610FA8F5A1388F4C7094256CCB
                Malicious:false
                Reputation:low
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A..(...{...{...{..4{$..{...{...{..5{j..{...z...{...z...{...{...{...z...{...z...{..*{...{...z...{Rich...{........................PE..L.....a...........!......................... .......................................................................e......pf......................................p`...............................`..@............ ...............................text............................... ..`.rdata..<U... ...V..................@..@.data....B.......&...^..............@....rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................

                Static File Info

                General

                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Entropy (8bit):7.939325980634555
                TrID:
                • Win32 Executable (generic) a (10002005/4) 92.16%
                • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:bhjRru88ej.exe
                File size:329536
                MD5:3461688b684c14bfa1b81f1a110254e4
                SHA1:70269a15f2b27f2a3a33a4028d7aeb2e1094db58
                SHA256:5869ff09468b1aafa73c0a8fa15c953995495aa7144114003fdc4743860639ad
                SHA512:bc1ecb387ca68cf57fa1264ad6567ddca62bbf87f97362a66d3755e48496afe8f9013186dc7d03bec6c5201f0c3906715ec8a00b16bc1fa1d394256692913b93
                SSDEEP:6144:rGiG8cKLnPjzfoNvzfe67vOpnNczXDErvIJHOZabXKtyYov27XebMWHsdjE:SdKXzr6enNczXQrIJHOsbyyHFxsdE
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................\...........0.....

                File Icon

                Icon Hash:b2a88c96b2ca6a72

                Static PE Info

                General

                Entrypoint:0x4030e3
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                DLL Characteristics:
                Time Stamp:0x48EFCDCD [Fri Oct 10 21:49:01 2008 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:7fa974366048f9c551ef45714595665e

                Entrypoint Preview

                Instruction
                sub esp, 00000180h
                push ebx
                push ebp
                push esi
                xor ebx, ebx
                push edi
                mov dword ptr [esp+18h], ebx
                mov dword ptr [esp+10h], 00409158h
                xor esi, esi
                mov byte ptr [esp+14h], 00000020h
                call dword ptr [00407030h]
                push 00008001h
                call dword ptr [004070B0h]
                push ebx
                call dword ptr [0040727Ch]
                push 00000008h
                mov dword ptr [0042EC18h], eax
                call 00007FBE8CB34E88h
                mov dword ptr [0042EB64h], eax
                push ebx
                lea eax, dword ptr [esp+34h]
                push 00000160h
                push eax
                push ebx
                push 00428F90h
                call dword ptr [00407158h]
                push 0040914Ch
                push 0042E360h
                call 00007FBE8CB34B3Fh
                call dword ptr [004070ACh]
                mov edi, 00434000h
                push eax
                push edi
                call 00007FBE8CB34B2Dh
                push ebx
                call dword ptr [0040710Ch]
                cmp byte ptr [00434000h], 00000022h
                mov dword ptr [0042EB60h], eax
                mov eax, edi
                jne 00007FBE8CB3236Ch
                mov byte ptr [esp+14h], 00000022h
                mov eax, 00434001h
                push dword ptr [esp+14h]
                push eax
                call 00007FBE8CB34620h
                push eax
                call dword ptr [0040721Ch]
                mov dword ptr [esp+1Ch], eax
                jmp 00007FBE8CB323C5h
                cmp cl, 00000020h
                jne 00007FBE8CB32368h
                inc eax
                cmp byte ptr [eax], 00000020h
                je 00007FBE8CB3235Ch
                cmp byte ptr [eax], 00000022h
                mov byte ptr [eax+eax+00h], 00000000h

                Rich Headers

                Programming Language:
                • [EXP] VC++ 6.0 SP5 build 8804

                Data Directories

                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x74b00xb4.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x370000x900.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                Sections

                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x5b680x5c00False0.67722486413data6.48746502716IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .rdata0x70000x129c0x1400False0.4337890625data5.04904254867IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x90000x25c580x400False0.58203125data4.76995537906IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .ndata0x2f0000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x370000x9000xa00False0.4078125data3.93441125971IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                Resources

                NameRVASizeTypeLanguageCountry
                RT_ICON0x371900x2e8dataEnglishUnited States
                RT_DIALOG0x374780x100dataEnglishUnited States
                RT_DIALOG0x375780x11cdataEnglishUnited States
                RT_DIALOG0x376980x60dataEnglishUnited States
                RT_GROUP_ICON0x376f80x14dataEnglishUnited States
                RT_MANIFEST0x377100x1ebXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                Imports

                DLLImport
                KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, SetFileTime, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetTempPathA
                USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA

                Possible Origin

                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States

                Network Behavior

                No network behavior found

                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:18:25:22
                Start date:02/12/2021
                Path:C:\Users\user\Desktop\bhjRru88ej.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\bhjRru88ej.exe"
                Imagebase:0x400000
                File size:329536 bytes
                MD5 hash:3461688B684C14BFA1B81F1A110254E4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.353597466.00000000025D0000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.353597466.00000000025D0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.353597466.00000000025D0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:low

                General

                Start time:18:25:24
                Start date:02/12/2021
                Path:C:\Users\user\Desktop\bhjRru88ej.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\bhjRru88ej.exe"
                Imagebase:0x400000
                File size:329536 bytes
                MD5 hash:3461688B684C14BFA1B81F1A110254E4
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.413560341.00000000009D0000.00000040.00020000.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.413560341.00000000009D0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.413560341.00000000009D0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.413505967.00000000005C0000.00000040.00020000.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.413505967.00000000005C0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.413505967.00000000005C0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.413413880.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.413413880.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.413413880.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000000.350595433.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000000.350595433.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000000.350595433.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000001.352601050.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000001.352601050.0000000000400000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000001.352601050.0000000000400000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000000.351883848.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000000.351883848.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000000.351883848.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:low

                General

                Start time:18:25:28
                Start date:02/12/2021
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\Explorer.EXE
                Imagebase:0x7ff6f22f0000
                File size:3933184 bytes
                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.384139517.00000000075EE000.00000040.00020000.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.384139517.00000000075EE000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.384139517.00000000075EE000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.397566356.00000000075EE000.00000040.00020000.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.397566356.00000000075EE000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.397566356.00000000075EE000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:high

                General

                Start time:18:25:51
                Start date:02/12/2021
                Path:C:\Windows\SysWOW64\colorcpl.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\colorcpl.exe
                Imagebase:0xac0000
                File size:86528 bytes
                MD5 hash:746F3B5E7652EA0766BA10414D317981
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.625740978.0000000000BC0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.630654958.0000000002FB0000.00000040.00020000.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.630654958.0000000002FB0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.630654958.0000000002FB0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.630203304.0000000002EB0000.00000040.00020000.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.630203304.0000000002EB0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.630203304.0000000002EB0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:moderate

                General

                Start time:18:25:58
                Start date:02/12/2021
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:/c del "C:\Users\user\Desktop\bhjRru88ej.exe"
                Imagebase:0x7ff614b90000
                File size:232960 bytes
                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:18:25:59
                Start date:02/12/2021
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0xc70000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:18:26:37
                Start date:02/12/2021
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\explorer.exe" /LOADSAVEDWINDOWS
                Imagebase:0x7ff6f22f0000
                File size:3933184 bytes
                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >