Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ay9xkK3NYN

Overview

General Information

Sample Name:Ay9xkK3NYN (renamed file extension from none to exe)
Analysis ID:620775
MD5:5fc986129c3d833b1c7e5ba6ff3678bc
SHA1:2ace6bc0488df9b8592e25be3de38e6c9a0c16da
SHA256:d02d076842cc94fa6612b13ff0d2f77e1ff9150d22607cfe3962da4234cf4ed5
Tags:32exeFormbooktrojan
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
System process connects to network (likely due to code injection or exploit)
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Machine Learning detection for sample
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Drops PE files
Contains functionality to read the PEB
Checks if the current process is being debugged
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • Ay9xkK3NYN.exe (PID: 6376 cmdline: "C:\Users\user\Desktop\Ay9xkK3NYN.exe" MD5: 5FC986129C3D833B1C7E5BA6FF3678BC)
    • rysgtozci.exe (PID: 6412 cmdline: C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\wduqqtzg MD5: 96B3C3B0F05B4CEDF349797D7CB05627)
      • rysgtozci.exe (PID: 6440 cmdline: C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\wduqqtzg MD5: 96B3C3B0F05B4CEDF349797D7CB05627)
        • explorer.exe (PID: 684 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
          • systray.exe (PID: 3060 cmdline: C:\Windows\SysWOW64\systray.exe MD5: 1373D481BE4C8A6E5F5030D2FB0A0C68)
            • cmd.exe (PID: 3348 cmdline: /c del "C:\Users\user\AppData\Local\Temp\rysgtozci.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
              • conhost.exe (PID: 6652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"C2 list": ["www.shishlomarket24.biz/fw02/"], "decoy": ["payer-breakers.com", "thesiscoper.com", "rental-villa.com", "scovikinnovations.com", "hydh33.com", "allmyshit.rest", "lovejaclyn.com", "vanessaruizwriting.com", "dufonddelaclasse.com", "kiddee168.com", "monumentalmarketsllc.com", "musclegainfatloss.com", "avida.info", "cosmo-wellness.net", "dandelionfusedigital.com", "oversizeloadbanners.com", "konstelle.store", "sdjnsbd.com", "czoqg.xyz", "5p6xljjse1lq.xyz", "10936.loan", "primeiropasso.website", "salarydetector.net", "the6figureshow.com", "ritzluxurytransportation.com", "5145.design", "web3ido.xyz", "starweaverdesigns.com", "cbdtz.com", "sunwall.xyz", "ornitv.com", "curateddesignsconsulting.com", "businesshairways.biz", "willacloud.com", "accusecures.com", "hl243.com", "coffellc.icu", "eddrugs2018.com", "lidakang.xyz", "salesstorecolombia.com", "ilina.xyz", "partieslikethese.com", "peymantasnimi.com", "datthocu.xyz", "cybertechsolutions.xyz", "findy.guru", "trybes.space", "arulinks.com", "yuriookinoart.com", "largestjerseysstore.com", "fortitude-tech.com", "ywfjp.com", "b1v097f2avze.xyz", "abdullahnazhim.com", "zhaoav111.info", "cegrowing.com", "llaveselmuerto.com", "7477e.xyz", "chabusinessloans.com", "ht-brain.com", "app-compound.finance", "0085208.com", "wewinaccidents.com", "ztzfirst.xyz"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18849:$sqlite3step: 68 34 1C 7B E1
    • 0x1895c:$sqlite3step: 68 34 1C 7B E1
    • 0x18878:$sqlite3text: 68 38 2A 90 C5
    • 0x1899d:$sqlite3text: 68 38 2A 90 C5
    • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
    0000000E.00000002.696256426.00000000048E0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000E.00000002.696256426.00000000048E0000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 28 entries
      SourceRuleDescriptionAuthorStrings
      2.0.rysgtozci.exe.400000.6.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        2.0.rysgtozci.exe.400000.6.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x148b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x143a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x149b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x979a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1361c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa493:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1ab27:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1bb2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        2.0.rysgtozci.exe.400000.6.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x17a49:$sqlite3step: 68 34 1C 7B E1
        • 0x17b5c:$sqlite3step: 68 34 1C 7B E1
        • 0x17a78:$sqlite3text: 68 38 2A 90 C5
        • 0x17b9d:$sqlite3text: 68 38 2A 90 C5
        • 0x17a8b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17bb3:$sqlite3blob: 68 53 D8 7F 8C
        2.2.rysgtozci.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          2.2.rysgtozci.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 22 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.shishlomarket24.biz/fw02/"], "decoy": ["payer-breakers.com", "thesiscoper.com", "rental-villa.com", "scovikinnovations.com", "hydh33.com", "allmyshit.rest", "lovejaclyn.com", "vanessaruizwriting.com", "dufonddelaclasse.com", "kiddee168.com", "monumentalmarketsllc.com", "musclegainfatloss.com", "avida.info", "cosmo-wellness.net", "dandelionfusedigital.com", "oversizeloadbanners.com", "konstelle.store", "sdjnsbd.com", "czoqg.xyz", "5p6xljjse1lq.xyz", "10936.loan", "primeiropasso.website", "salarydetector.net", "the6figureshow.com", "ritzluxurytransportation.com", "5145.design", "web3ido.xyz", "starweaverdesigns.com", "cbdtz.com", "sunwall.xyz", "ornitv.com", "curateddesignsconsulting.com", "businesshairways.biz", "willacloud.com", "accusecures.com", "hl243.com", "coffellc.icu", "eddrugs2018.com", "lidakang.xyz", "salesstorecolombia.com", "ilina.xyz", "partieslikethese.com", "peymantasnimi.com", "datthocu.xyz", "cybertechsolutions.xyz", "findy.guru", "trybes.space", "arulinks.com", "yuriookinoart.com", "largestjerseysstore.com", "fortitude-tech.com", "ywfjp.com", "b1v097f2avze.xyz", "abdullahnazhim.com", "zhaoav111.info", "cegrowing.com", "llaveselmuerto.com", "7477e.xyz", "chabusinessloans.com", "ht-brain.com", "app-compound.finance", "0085208.com", "wewinaccidents.com", "ztzfirst.xyz"]}
          Source: Ay9xkK3NYN.exeVirustotal: Detection: 37%Perma Link
          Source: Ay9xkK3NYN.exeReversingLabs: Detection: 42%
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.rysgtozci.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.rysgtozci.exe.600000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.rysgtozci.exe.600000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.rysgtozci.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.696256426.00000000048E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.553285992.00000000005B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.694897544.0000000000C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.441965873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.491644734.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.695692167.00000000048B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.440397426.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.552642858.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.516553688.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.445776431.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Ay9xkK3NYN.exeJoe Sandbox ML: detected
          Source: 2.0.rysgtozci.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 1.2.rysgtozci.exe.600000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 2.0.rysgtozci.exe.400000.5.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 2.0.rysgtozci.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 2.2.rysgtozci.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: Ay9xkK3NYN.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: Ay9xkK3NYN.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: rysgtozci.exe, 00000001.00000003.442893277.0000000002390000.00000004.00001000.00020000.00000000.sdmp, rysgtozci.exe, 00000001.00000003.442019439.0000000002200000.00000004.00001000.00020000.00000000.sdmp, rysgtozci.exe, 00000002.00000002.555003506.0000000000BCF000.00000040.00000800.00020000.00000000.sdmp, rysgtozci.exe, 00000002.00000002.554734840.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, systray.exe, 0000000E.00000002.697178220.0000000004D50000.00000040.00000800.00020000.00000000.sdmp, systray.exe, 0000000E.00000002.698632878.0000000004E6F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: rysgtozci.exe, rysgtozci.exe, 00000002.00000002.555003506.0000000000BCF000.00000040.00000800.00020000.00000000.sdmp, rysgtozci.exe, 00000002.00000002.554734840.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, systray.exe, systray.exe, 0000000E.00000002.697178220.0000000004D50000.00000040.00000800.00020000.00000000.sdmp, systray.exe, 0000000E.00000002.698632878.0000000004E6F000.00000040.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeCode function: 0_2_0040290B FindFirstFileW,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 4x nop then pop esi
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 4x nop then pop ebx
          Source: C:\Windows\SysWOW64\systray.exeCode function: 4x nop then pop ebx
          Source: C:\Windows\SysWOW64\systray.exeCode function: 4x nop then pop esi

          Networking

          barindex
          Source: C:\Windows\explorer.exeDomain query: www.fortitude-tech.com
          Source: Malware configuration extractorURLs: www.shishlomarket24.biz/fw02/
          Source: unknownDNS traffic detected: query: www.fortitude-tech.com replaycode: Name error (3)
          Source: Ay9xkK3NYN.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: unknownDNS traffic detected: queries for: www.fortitude-tech.com
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeCode function: 0_2_004056A8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.rysgtozci.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.rysgtozci.exe.600000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.rysgtozci.exe.600000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.rysgtozci.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.696256426.00000000048E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.553285992.00000000005B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.694897544.0000000000C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.441965873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.491644734.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.695692167.00000000048B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.440397426.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.552642858.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.516553688.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.445776431.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 2.0.rysgtozci.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.rysgtozci.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.rysgtozci.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.rysgtozci.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.rysgtozci.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.rysgtozci.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.rysgtozci.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.rysgtozci.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.rysgtozci.exe.600000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.rysgtozci.exe.600000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 1.2.rysgtozci.exe.600000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 1.2.rysgtozci.exe.600000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.rysgtozci.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.rysgtozci.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.0.rysgtozci.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.0.rysgtozci.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.rysgtozci.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.rysgtozci.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000E.00000002.696256426.00000000048E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000E.00000002.696256426.00000000048E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.553285992.00000000005B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.553285992.00000000005B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000E.00000002.694897544.0000000000C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000E.00000002.694897544.0000000000C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000000.441965873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000000.441965873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000000.491644734.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000000.491644734.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000E.00000002.695692167.00000000048B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000E.00000002.695692167.00000000048B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000000.440397426.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000000.440397426.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.552642858.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.552642858.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000000.516553688.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000000.516553688.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000001.00000002.445776431.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000001.00000002.445776431.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Ay9xkK3NYN.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          Source: 2.0.rysgtozci.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.rysgtozci.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.rysgtozci.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.rysgtozci.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.rysgtozci.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.rysgtozci.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.rysgtozci.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.rysgtozci.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.rysgtozci.exe.600000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.rysgtozci.exe.600000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 1.2.rysgtozci.exe.600000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 1.2.rysgtozci.exe.600000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.rysgtozci.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.rysgtozci.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.0.rysgtozci.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.0.rysgtozci.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.rysgtozci.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.rysgtozci.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000E.00000002.696256426.00000000048E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000E.00000002.696256426.00000000048E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.553285992.00000000005B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.553285992.00000000005B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000E.00000002.694897544.0000000000C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000E.00000002.694897544.0000000000C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000000.441965873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000000.441965873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000000.491644734.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000000.491644734.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000E.00000002.695692167.00000000048B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000E.00000002.695692167.00000000048B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000000.440397426.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000000.440397426.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.552642858.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.552642858.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000000.516553688.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000000.516553688.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000001.00000002.445776431.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000001.00000002.445776431.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeCode function: 0_2_00406BFE
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00401026
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00401030
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041F033
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041E2B8
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041EBA7
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041EBBD
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00402D87
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00402D90
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041E5B3
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041D658
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00409E5D
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00409E60
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041EE0D
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041DE97
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00402FB0
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B020A0
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA20A8
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AEB090
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA28EC
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91002
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AF4120
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADF900
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA22AE
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0EBB0
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9DBD2
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA2B28
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE841F
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9D466
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B02581
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AED5E0
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA25DD
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD0D20
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA2D07
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA1D55
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA2EF7
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AF6E30
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9D616
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA1FF1
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E3D466
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8841F
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8D5E0
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E425DD
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA2581
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E41D55
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E42D07
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D70D20
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E42EF7
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D96E30
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E3D616
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E41FF1
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E4DFCE
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E428EC
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8B090
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E420A8
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA20A0
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E4E824
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31002
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D7F900
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D94120
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E422AE
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E2FA2B
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E3DBD2
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E303DA
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAEBB0
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E42B28
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9F033
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9EBA7
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9EBBD
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C82D87
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C82D90
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9E5B3
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C89E5D
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C89E60
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9EE0D
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C82FB0
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: String function: 00ADB150 appears 35 times
          Source: C:\Windows\SysWOW64\systray.exeCode function: String function: 04D7B150 appears 45 times
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041A360 NtCreateFile,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041A410 NtReadFile,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041A490 NtClose,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041A540 NtAllocateVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041A40A NtReadFile,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041A48A NtClose,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041A53C NtAllocateVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B198F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B199A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B195D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B196E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B197A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B198A0 NtWriteVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19820 NtEnumerateKey,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B1B040 NtSuspendThread,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B199D0 NtCreateProcessEx,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19950 NtQueueApcThread,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19A80 NtOpenDirectoryObject,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19A10 NtQuerySection,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B1A3B0 NtGetContextThread,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19B00 NtSetValueKey,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B195F0 NtQueryInformationFile,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B1AD30 NtSetContextThread,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19520 NtWaitForSingleObject,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19560 NtWriteFile,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B196D0 NtCreateKey,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19610 NtEnumerateValueKey,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19670 NtQueryInformationProcess,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19650 NtQueryValueKey,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19FE0 NtCreateMutant,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19730 NtQueryVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B1A710 NtOpenProcessToken,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19770 NtSetInformationFile,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B1A770 NtOpenThread,
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B19760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB95D0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB96D0 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9650 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB95F0 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9560 NtWriteFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DBAD30 NtSetContextThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9520 NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9670 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9610 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB97A0 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DBA770 NtOpenThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9770 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9760 NtOpenProcess,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DBA710 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9730 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB98F0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB98A0 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DBB040 NtSuspendThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9820 NtEnumerateKey,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB99D0 NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9950 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9A80 NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9A10 NtQuerySection,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9A00 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9A20 NtResumeThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DBA3B0 NtGetContextThread,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB9B00 NtSetValueKey,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9A360 NtCreateFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9A490 NtClose,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9A410 NtReadFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9A540 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9A48A NtClose,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9A40A NtReadFile,
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9A53C NtAllocateVirtualMemory,
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\rysgtozci.exe 874F73E2673462859967AFC64C3C33C1957D7B69915124CCA91CED26DCFCD5C0
          Source: Ay9xkK3NYN.exeVirustotal: Detection: 37%
          Source: Ay9xkK3NYN.exeReversingLabs: Detection: 42%
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeFile read: C:\Users\user\Desktop\Ay9xkK3NYN.exeJump to behavior
          Source: Ay9xkK3NYN.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\Ay9xkK3NYN.exe "C:\Users\user\Desktop\Ay9xkK3NYN.exe"
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeProcess created: C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\wduqqtzg
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeProcess created: C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\wduqqtzg
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\systray.exe C:\Windows\SysWOW64\systray.exe
          Source: C:\Windows\SysWOW64\systray.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\AppData\Local\Temp\rysgtozci.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeProcess created: C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\wduqqtzg
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeProcess created: C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\wduqqtzg
          Source: C:\Windows\SysWOW64\systray.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\AppData\Local\Temp\rysgtozci.exe"
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeFile created: C:\Users\user\AppData\Local\Temp\nsb28F1.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@9/3@1/0
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeCode function: 0_2_004021AA CoCreateInstance,
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeCode function: 0_2_00404954 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6652:120:WilError_01
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Ay9xkK3NYN.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: rysgtozci.exe, 00000001.00000003.442893277.0000000002390000.00000004.00001000.00020000.00000000.sdmp, rysgtozci.exe, 00000001.00000003.442019439.0000000002200000.00000004.00001000.00020000.00000000.sdmp, rysgtozci.exe, 00000002.00000002.555003506.0000000000BCF000.00000040.00000800.00020000.00000000.sdmp, rysgtozci.exe, 00000002.00000002.554734840.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, systray.exe, 0000000E.00000002.697178220.0000000004D50000.00000040.00000800.00020000.00000000.sdmp, systray.exe, 0000000E.00000002.698632878.0000000004E6F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: rysgtozci.exe, rysgtozci.exe, 00000002.00000002.555003506.0000000000BCF000.00000040.00000800.00020000.00000000.sdmp, rysgtozci.exe, 00000002.00000002.554734840.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, systray.exe, systray.exe, 0000000E.00000002.697178220.0000000004D50000.00000040.00000800.00020000.00000000.sdmp, systray.exe, 0000000E.00000002.698632878.0000000004E6F000.00000040.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041AA66 push ds; ret
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0040E29C push ds; ret
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041D4B5 push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041D56C push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041D502 push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041D50B push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0041BD3A push esp; retf 8B55h
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B2D0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DCD0D1 push ecx; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C8E29C push ds; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9AA66 push ds; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9D4B5 push eax; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9D56C push eax; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9D50B push eax; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9D502 push eax; ret
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_00C9BD3A push esp; retf 8B55h
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeFile created: C:\Users\user\AppData\Local\Temp\rysgtozci.exeJump to dropped file

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8F 0xFE 0xEA
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\systray.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeRDTSC instruction interceptor: First address: 0000000000409B7E second address: 0000000000409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\systray.exeRDTSC instruction interceptor: First address: 0000000000C89904 second address: 0000000000C8990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\systray.exeRDTSC instruction interceptor: First address: 0000000000C89B7E second address: 0000000000C89B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\systray.exeLast function: Thread delayed
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00409AB0 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeAPI coverage: 8.6 %
          Source: C:\Windows\SysWOW64\systray.exeAPI coverage: 9.2 %
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeCode function: 0_2_0040290B FindFirstFileW,
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeAPI call chain: ExitProcess graph end node
          Source: explorer.exe, 00000003.00000000.487656419.0000000007EF6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000003.00000000.488122847.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}8Ll/
          Source: explorer.exe, 00000003.00000000.488122847.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000003.00000000.487656419.0000000007EF6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000003.00000000.455819230.0000000006915000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000003.00000000.469579569.00000000080B1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: explorer.exe, 00000003.00000000.487656419.0000000007EF6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00409AB0 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\systray.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0F0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0F0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B020A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B190AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B53884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B53884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B6B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B6B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B6B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B6B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B6B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B6B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AEB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AEB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AEB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AEB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B57016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B57016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B57016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA4015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B92073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA1074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AF0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AF0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B551BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B551BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B551BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B551BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B061A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B061A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B569A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B02990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AFC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0A185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B641E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AF4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AF4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AF4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AF4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AF4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AFB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AFB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0FAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AEAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AEAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0D294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B02AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B02ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B14A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B14A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AF3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B1927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B8B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B8B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA8A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B64257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B04BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B04BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B04BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA5BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0B390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B02397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B8D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AFDBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B003E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B553CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B553CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B03B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B03B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA8B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B914FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B56CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B56CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B56CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA8CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0BC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B56C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B56C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B56C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B56C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AF746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B6C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B6C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0A44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B01DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B01DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B01DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B035A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA05AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0FD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B02581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B02581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B02581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B02581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B88DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AED5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AED5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B56DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B56DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B56DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B56DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B56DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B56DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B5A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B04D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B04D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B04D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA8D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AFC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AFC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B13D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B53540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AF7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B546A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA0EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B6FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B016E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA8ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B18EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B8FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B036CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B8FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0A61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00ADC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B08E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B91608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AFAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AFAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AFAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AFAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AFAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B9AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B57794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B57794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B57794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AE8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B137F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0E730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AD4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B6FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B6FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AFF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00B0A70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AEFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00BA8F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_00AEEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E314FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF6CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E48CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E0C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E0C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D9746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF6C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E4740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E4740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E4740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DABC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E3FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E3FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E3FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E3FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E28DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF6DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF6DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8D5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E405AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E405AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D72D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D72D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D72D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D72D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D72D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D97D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF3540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E23D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D9C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D9C577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E48D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E3E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D7AD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DFA537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D83D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D83D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D83D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D83D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D83D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D83D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D83D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D83D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D83D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D83D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D83D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D83D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D83D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB8EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E2FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E48ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D876E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E40EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E40EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E40EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E0FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF46A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D87E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D87E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D87E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D87E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D87E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D87E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E3AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E3AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D9AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D9AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D9AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D9AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D9AE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D7C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D7C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D7C600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E2FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E31608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D7E620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF7794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D88794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E48F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8EF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8FF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D9F716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E4070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E4070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E0FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E0FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D74F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D74F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E0B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E0B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E0B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E0B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E0B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E0B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D740E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D740E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D740E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D758EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D79080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF3884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D90050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D90050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E32073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E41074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF7016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E44015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E44015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8B02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E041E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D7B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D7B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D7B1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E349A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E349A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E349A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E349A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D9C182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF51BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DF69A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D9B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D9B944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D7B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D7B171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D7C962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D79100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D79100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D79100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D94120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D94120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D94120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D94120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D94120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DA2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAD294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D8AAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DAFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D752A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E2B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E2B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04E48A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D79240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D79240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D79240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04D79240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\systray.exeCode function: 14_2_04DB927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\systray.exeProcess queried: DebugPort
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeCode function: 2_2_0040ACF0 LdrLoadDll,

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeDomain query: www.fortitude-tech.com
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeSection unmapped: C:\Windows\SysWOW64\systray.exe base address: D70000
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeSection loaded: unknown target: C:\Windows\SysWOW64\systray.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeSection loaded: unknown target: C:\Windows\SysWOW64\systray.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\systray.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\systray.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\systray.exeSection loaded: unknown target: unknown protection: read write
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeThread APC queued: target process: C:\Windows\explorer.exe
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeThread register set: target process: 684
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeThread register set: target process: 684
          Source: C:\Windows\SysWOW64\systray.exeThread register set: target process: 684
          Source: C:\Users\user\AppData\Local\Temp\rysgtozci.exeProcess created: C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\wduqqtzg
          Source: C:\Windows\SysWOW64\systray.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\AppData\Local\Temp\rysgtozci.exe"
          Source: explorer.exe, 00000003.00000000.468227279.0000000007EF6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.497096439.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.482680160.0000000006100000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000003.00000000.535949513.0000000000E38000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000000.497096439.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.449192547.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000003.00000000.497096439.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.449192547.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.478366360.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: YProgram Managerf
          Source: explorer.exe, 00000003.00000000.497096439.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.449192547.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000003.00000000.478366360.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\Ay9xkK3NYN.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.rysgtozci.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.rysgtozci.exe.600000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.rysgtozci.exe.600000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.rysgtozci.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.696256426.00000000048E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.553285992.00000000005B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.694897544.0000000000C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.441965873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.491644734.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.695692167.00000000048B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.440397426.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.552642858.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.516553688.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.445776431.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.rysgtozci.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.rysgtozci.exe.600000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.rysgtozci.exe.600000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.rysgtozci.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.rysgtozci.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.696256426.00000000048E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.553285992.00000000005B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.694897544.0000000000C80000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.441965873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.491644734.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.695692167.00000000048B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000000.440397426.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.552642858.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.516553688.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.445776431.0000000000600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Shared Modules
          Path Interception1
          Access Token Manipulation
          1
          Rootkit
          1
          Credential API Hooking
          121
          Security Software Discovery
          Remote Services1
          Credential API Hooking
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
          System Shutdown/Reboot
          Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts512
          Process Injection
          1
          Virtualization/Sandbox Evasion
          LSASS Memory1
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Archive Collected Data
          Exfiltration Over Bluetooth1
          Non-Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
          Access Token Manipulation
          Security Account Manager2
          Process Discovery
          SMB/Windows Admin Shares1
          Clipboard Data
          Automated Exfiltration11
          Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)512
          Process Injection
          NTDS1
          Remote System Discovery
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets2
          File and Directory Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common3
          Obfuscated Files or Information
          Cached Domain Credentials13
          System Information Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items1
          Software Packing
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 620775 Sample: Ay9xkK3NYN Startdate: 05/05/2022 Architecture: WINDOWS Score: 100 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 4 other signatures 2->49 11 Ay9xkK3NYN.exe 18 2->11         started        process3 file4 31 C:\Users\user\AppData\Local\...\rysgtozci.exe, PE32 11->31 dropped 14 rysgtozci.exe 11->14         started        process5 signatures6 59 Tries to detect virtualization through RDTSC time measurements 14->59 17 rysgtozci.exe 14->17         started        process7 signatures8 35 Modifies the context of a thread in another process (thread injection) 17->35 37 Maps a DLL or memory area into another process 17->37 39 Sample uses process hollowing technique 17->39 41 Queues an APC in another process (thread injection) 17->41 20 explorer.exe 17->20 injected process9 dnsIp10 33 www.fortitude-tech.com 20->33 51 System process connects to network (likely due to code injection or exploit) 20->51 24 systray.exe 20->24         started        signatures11 process12 signatures13 53 Modifies the context of a thread in another process (thread injection) 24->53 55 Maps a DLL or memory area into another process 24->55 57 Tries to detect virtualization through RDTSC time measurements 24->57 27 cmd.exe 1 24->27         started        process14 process15 29 conhost.exe 27->29         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Ay9xkK3NYN.exe37%VirustotalBrowse
          Ay9xkK3NYN.exe43%ReversingLabsWin32.Trojan.LokiBot
          Ay9xkK3NYN.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          2.0.rysgtozci.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          1.2.rysgtozci.exe.600000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          2.0.rysgtozci.exe.400000.5.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          2.0.rysgtozci.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          2.2.rysgtozci.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          www.shishlomarket24.biz/fw02/0%VirustotalBrowse
          www.shishlomarket24.biz/fw02/0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.fortitude-tech.com
          unknown
          unknowntrue
            unknown
            NameMaliciousAntivirus DetectionReputation
            www.shishlomarket24.biz/fw02/true
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            low
            NameSourceMaliciousAntivirus DetectionReputation
            http://nsis.sf.net/NSIS_ErrorErrorAy9xkK3NYN.exefalse
              high
              No contacted IP infos
              Joe Sandbox Version:34.0.0 Boulder Opal
              Analysis ID:620775
              Start date and time: 05/05/202208:10:332022-05-05 08:10:33 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 9m 16s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:Ay9xkK3NYN (renamed file extension from none to exe)
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:25
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:1
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@9/3@1/0
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 61.7% (good quality ratio 56.7%)
              • Quality average: 74%
              • Quality standard deviation: 30.6%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.54.89.106, 52.152.110.14, 40.125.122.176, 20.223.24.244, 52.242.101.226
              • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
              • Not all processes where analyzed, report is missing behavior information
              No simulations
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\Desktop\Ay9xkK3NYN.exe
              File Type:data
              Category:dropped
              Size (bytes):189439
              Entropy (8bit):7.991393966173862
              Encrypted:true
              SSDEEP:3072:4j17qN4Bvdkw8J7ApvkCao2zXSlae7jCc6g31Wy4iUCxNENtYVnqGPonTfLwJ8:4jNTvNuApvbaoiSl57jh6g31Y3raVnq1
              MD5:B5B1C1F4818202956B29108FB25DEC20
              SHA1:7E74A79237D3090B0DBAC83B2C038D849FDE6382
              SHA-256:D0DA793571AA99C98E2AFCA3BE0F3D6850AABBACF2ACA4EEAB8013E4EBF77A67
              SHA-512:8ECD3FE32528D30C76C47763DB6723CD69D2D8842FEFCC7B3F12599B4F4F546C5AD4BD5C3C604F666FDE36FD168945303414D54CD709DF56FE96D08BBFE063E2
              Malicious:false
              Reputation:low
              Preview:.^V.e..s...^.....[K..*#..o..5.~.._..H.......;..-.$.%.O.F....24......K.wZ.J....R;...(....)3;J......U.*....rS...=......}.8H7..i..l.V...DNP#.....UNzq]...I..mw...F......Ip.K.L..z....`K._x.E.f....||..6(SEG....#.yI=......x.^K.^.t..P.d.......\~0..:^2.B:..;EIBe........BO.o\[.M.uM5.z..~.._..H.......;..-.j.%.O.F....2~.PR..yKR.X........}..r}.......w.hG.B&..fW...=..Gb.;.K_E..}.8H76.....By.3.*.,k..]|..f.). .\ ..)..<8..Eh>x.SgFL..z......&qx.Ep.....|r?k.(.EG......[h..6..4xn.^K.^.t.F...d.....T.\~s..p^2.?:.q;.IBe.......BO.G.[..uM5.>.5.~.._..H.......;..-.$.%.O.F....2~.PR..yKR.X........}..r}.......w.hG.B&..fW...=..Gb.;.K_E..}.8H76.....By.3.*.,k..]|..f.). .\ ..)..<8..Eh>x.SgFL..z....`K._x.E.......|r.t.(SEG......[h..6..4xx.^K.^.t.F...d.....T.\~s..p^2.?:.q;.IBe.......BO.G.[..uM5.>.5.~.._..H.......;..-.$.%.O.F....2~.PR..yKR.X........}..r}.......w.hG.B&..fW...=..Gb.;.K_E..}.8H76.....By.3.*.,k..]|..f.). .\ ..)..<8..Eh>x.SgFL..z....`K._x.E.......|r.t.(SEG......[h..6..4xx.^K.^.t.
              Process:C:\Users\user\Desktop\Ay9xkK3NYN.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):5632
              Entropy (8bit):4.524680277533852
              Encrypted:false
              SSDEEP:96:X5xApGY3bxCrq+M7sYx+MeBZtXIpXSdOWPmoynsx:X5xAQY3w2QweBZVIpidPPmoyn
              MD5:96B3C3B0F05B4CEDF349797D7CB05627
              SHA1:B2D7084DCAE06676C21D0AB393C60D6480E1D03F
              SHA-256:874F73E2673462859967AFC64C3C33C1957D7B69915124CCA91CED26DCFCD5C0
              SHA-512:E264E979679A7DCD410B2916EC16F8333CBA6A45D59FAAD99C9A45FF75D0E574D6ECBB52FB21A7B89732A8236B5F5416FD8FCFFB595692F451DD6556B9641E73
              Malicious:true
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......T.1..m_B.m_B.m_B.r[B.m_B.qQB.m_B.rUB.m_BK.^C.m_B.m^B]m_B.3[C.m_B.3.B.m_B.3]C.m_BRich.m_B........PE..L...V0sb..................................... ....@..........................P...............................................".......@...............................!............................................... ..`............................text...z........................... ..`.rdata....... ......................@..@.data...<....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\Ay9xkK3NYN.exe
              File Type:data
              Category:dropped
              Size (bytes):5381
              Entropy (8bit):6.0977076898399645
              Encrypted:false
              SSDEEP:96:R9mon8+8wowi4vsVmHxXTR9yprcP4b0hHryNB+3Oc02rv5FJ2EZdrH:browmYXT36r1YuIFBrv5FJXLrH
              MD5:CEA27FDA9443DD5882439188C2494A7B
              SHA1:89B7F9C46C4462F37EE6E91D639CCDD3084E03CD
              SHA-256:26A0EF0FE1FDAB9E6DAE3CAECEC085C3800A44D32CD5B87C182C0C0A6B559F59
              SHA-512:12040C4009E23EC2D4CF15A9F5B31587070F6086F2816EFEB946A6D2F1609339BA66A8639F187D2AC97D0284264DF7AEE0F62B40EA550567B5E35F66992A1C87
              Malicious:false
              Preview: ;.??D.#.#.JMV.T/?.V...._.V....'.T7?..3.???.T+?>..>....7O'2???....D.>..>....7O']???....D.>..>....7O'.???....D.>..>....7O's???....D{...;....W..::...._.D[..';....'.<#..'.<3.;x...P6(..':D3.;...3VM.T+.[/..'????.;.4..T3>..P>..Y>...W>...P>._.>.'U.-...G..6.G.C+..%8./>...Y..4../:T3'????...;.???.;.|..T+U.../.UR...?D.#HH.V....7...?......?.<...x..x;.D7..3...?..<..8..7.D3...?..9}.'.A??'.A??..?..>^.'.A??'MA??..?.|S..'EA??'.A??..?D.#.#.V....'..7.???.....3..7?....3}??..3...3..7G..7"['G4??.........P..?..|..K|...'...Px.?..|..K|.A..W..?..4.O..>^.'.8??O'.,>>..+"...'O>..'I>>>..+..+?.=.T/?".../8???../..;?D.#.#..V....'..7.???.....3..7?....3}??..3...3..7G..7"['.;??.....???.....P..?..|..K|{.....Px.?..|..K|{.....P....|..K|{......Y..:.....C.{..'...Px.A..|..K|{.4..W..?..4.O..9}.'a???O' 3>>..+...?....'.<..8".>..>..>..>..>..'.5>>..+..+?.=.T/?".../8???../...?D.#.#...7.???..[..3..7?....3}??..3...3..7G..7"['.:??.........P..?..|[.K|'.....Px.?..|[.K|'.A..W..?..4[O.|S..'.???O'.3>>..+".>..>..'v,>
              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
              Entropy (8bit):7.887563460066861
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:Ay9xkK3NYN.exe
              File size:219440
              MD5:5fc986129c3d833b1c7e5ba6ff3678bc
              SHA1:2ace6bc0488df9b8592e25be3de38e6c9a0c16da
              SHA256:d02d076842cc94fa6612b13ff0d2f77e1ff9150d22607cfe3962da4234cf4ed5
              SHA512:7f496926ea5026eda78532c001ce21e6f9f6ec4474ee995909a53f106def291cd7338072e56b29b7844ea43dc83fcd3eb6f8e36d2db5d8d5e0281059d60f9043
              SSDEEP:3072:l1NjcVVnLpPunbD0r9X/MP5LsCIVa1aP+KQ4kFHP67DzJEhShrM/joS9zAQNgOau:HNeZmQrV/MP8XXklIiheMLPztvau
              TLSH:DA2412351380C8E7D91B07305E392BA7D7B9AB366375931B139826ACBCA1391E31F794
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................f...*.....
              Icon Hash:b2a88c96b2ca6a72
              Entrypoint:0x4034f7
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x614F9AE5 [Sat Sep 25 21:55:49 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
              Instruction
              push ebp
              mov ebp, esp
              sub esp, 000003F4h
              push ebx
              push esi
              push edi
              push 00000020h
              pop edi
              xor ebx, ebx
              push 00008001h
              mov dword ptr [ebp-14h], ebx
              mov dword ptr [ebp-04h], 0040A2E0h
              mov dword ptr [ebp-10h], ebx
              call dword ptr [004080CCh]
              mov esi, dword ptr [004080D0h]
              lea eax, dword ptr [ebp-00000140h]
              push eax
              mov dword ptr [ebp-0000012Ch], ebx
              mov dword ptr [ebp-2Ch], ebx
              mov dword ptr [ebp-28h], ebx
              mov dword ptr [ebp-00000140h], 0000011Ch
              call esi
              test eax, eax
              jne 00007F512CDE74AAh
              lea eax, dword ptr [ebp-00000140h]
              mov dword ptr [ebp-00000140h], 00000114h
              push eax
              call esi
              mov ax, word ptr [ebp-0000012Ch]
              mov ecx, dword ptr [ebp-00000112h]
              sub ax, 00000053h
              add ecx, FFFFFFD0h
              neg ax
              sbb eax, eax
              mov byte ptr [ebp-26h], 00000004h
              not eax
              and eax, ecx
              mov word ptr [ebp-2Ch], ax
              cmp dword ptr [ebp-0000013Ch], 0Ah
              jnc 00007F512CDE747Ah
              and word ptr [ebp-00000132h], 0000h
              mov eax, dword ptr [ebp-00000134h]
              movzx ecx, byte ptr [ebp-00000138h]
              mov dword ptr [0042A2D8h], eax
              xor eax, eax
              mov ah, byte ptr [ebp-0000013Ch]
              movzx eax, ax
              or eax, ecx
              xor ecx, ecx
              mov ch, byte ptr [ebp-2Ch]
              movzx ecx, cx
              shl eax, 10h
              or eax, ecx
              Programming Language:
              • [EXP] VC++ 6.0 SP5 build 8804
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b0000xa50.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x65150x6600False0.661534926471data6.43970794855IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rdata0x80000x139a0x1400False0.45data5.14577456407IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0xa0000x203380x600False0.499348958333data4.01369865045IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .ndata0x2b0000x100000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rsrc0x3b0000xa500xc00False0.402018229167data4.18462166815IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_ICON0x3b1900x2e8dataEnglishUnited States
              RT_DIALOG0x3b4780x100dataEnglishUnited States
              RT_DIALOG0x3b5780x11cdataEnglishUnited States
              RT_DIALOG0x3b6980x60dataEnglishUnited States
              RT_GROUP_ICON0x3b6f80x14dataEnglishUnited States
              RT_MANIFEST0x3b7100x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
              DLLImport
              ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
              SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
              ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
              COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
              USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
              GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
              KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              TimestampSource PortDest PortSource IPDest IP
              May 5, 2022 08:13:46.498192072 CEST6353853192.168.2.58.8.8.8
              May 5, 2022 08:13:46.538089991 CEST53635388.8.8.8192.168.2.5
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              May 5, 2022 08:13:46.498192072 CEST192.168.2.58.8.8.80x6b14Standard query (0)www.fortitude-tech.comA (IP address)IN (0x0001)
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              May 5, 2022 08:13:46.538089991 CEST8.8.8.8192.168.2.50x6b14Name error (3)www.fortitude-tech.comnonenoneA (IP address)IN (0x0001)

              Code Manipulations

              Function NameHook TypeActive in Processes
              PeekMessageAINLINEexplorer.exe
              PeekMessageWINLINEexplorer.exe
              GetMessageWINLINEexplorer.exe
              GetMessageAINLINEexplorer.exe
              Function NameHook TypeNew Data
              PeekMessageAINLINE0x48 0x8B 0xB8 0x8F 0xFE 0xEA
              PeekMessageWINLINE0x48 0x8B 0xB8 0x87 0x7E 0xEA
              GetMessageWINLINE0x48 0x8B 0xB8 0x87 0x7E 0xEA
              GetMessageAINLINE0x48 0x8B 0xB8 0x8F 0xFE 0xEA

              Click to jump to process

              Target ID:0
              Start time:08:11:46
              Start date:05/05/2022
              Path:C:\Users\user\Desktop\Ay9xkK3NYN.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\Ay9xkK3NYN.exe"
              Imagebase:0x400000
              File size:219440 bytes
              MD5 hash:5FC986129C3D833B1C7E5BA6FF3678BC
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              Target ID:1
              Start time:08:11:48
              Start date:05/05/2022
              Path:C:\Users\user\AppData\Local\Temp\rysgtozci.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\wduqqtzg
              Imagebase:0x400000
              File size:5632 bytes
              MD5 hash:96B3C3B0F05B4CEDF349797D7CB05627
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.445776431.0000000000600000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.445776431.0000000000600000.00000004.00001000.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.445776431.0000000000600000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              Reputation:low

              Target ID:2
              Start time:08:11:49
              Start date:05/05/2022
              Path:C:\Users\user\AppData\Local\Temp\rysgtozci.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\AppData\Local\Temp\rysgtozci.exe C:\Users\user\AppData\Local\Temp\wduqqtzg
              Imagebase:0x400000
              File size:5632 bytes
              MD5 hash:96B3C3B0F05B4CEDF349797D7CB05627
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.553583563.00000000005E0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.553285992.00000000005B0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.553285992.00000000005B0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.553285992.00000000005B0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000000.441965873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000000.441965873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000000.441965873.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000000.440397426.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000000.440397426.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000000.440397426.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.552642858.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.552642858.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.552642858.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              Reputation:low

              Target ID:3
              Start time:08:11:55
              Start date:05/05/2022
              Path:C:\Windows\explorer.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\Explorer.EXE
              Imagebase:0x7ff74fc70000
              File size:3933184 bytes
              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000000.491644734.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000000.491644734.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000000.491644734.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000000.516553688.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000000.516553688.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000000.516553688.000000000F6CB000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              Reputation:high

              Target ID:14
              Start time:08:12:39
              Start date:05/05/2022
              Path:C:\Windows\SysWOW64\systray.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\SysWOW64\systray.exe
              Imagebase:0xd70000
              File size:9728 bytes
              MD5 hash:1373D481BE4C8A6E5F5030D2FB0A0C68
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000E.00000002.696256426.00000000048E0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000E.00000002.696256426.00000000048E0000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000E.00000002.696256426.00000000048E0000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000E.00000002.694897544.0000000000C80000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000E.00000002.694897544.0000000000C80000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000E.00000002.694897544.0000000000C80000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000E.00000002.695692167.00000000048B0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000E.00000002.695692167.00000000048B0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
              • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000E.00000002.695692167.00000000048B0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              Reputation:moderate

              Target ID:17
              Start time:08:12:46
              Start date:05/05/2022
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:/c del "C:\Users\user\AppData\Local\Temp\rysgtozci.exe"
              Imagebase:0x1100000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:18
              Start time:08:12:47
              Start date:05/05/2022
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff77f440000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              No disassembly