Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Strictor.272734.30355.11938

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Strictor.272734.30355.11938 (renamed file extension from 11938 to exe)
Analysis ID:632534
MD5:f7b5a24637b27abfd5809a27997ea31d
SHA1:7230e7f3bcb4e57d73fedf3c0d85067e95761323
SHA256:ced900f9ec05901373c3ae09a06b3ef5ef958764f1fc551590b5f2a820f115a1
Tags:exeFormbook
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cleanup
{"C2 list": ["www.gulabmonga.com/gfge/"], "decoy": ["loopcoalition.com", "hd126.com", "elioguion.net", "defitrader.academy", "exactemi.com", "angeloacierno.com", "range4tis.com", "ilovekuduro.us", "mydealsstation.com", "jerichoprinting.com", "birdcafe605.com", "freemansrepublic.com", "driedplasma.com", "valuableconnect.com", "anthonyvid.xyz", "theydo.support", "devnetsecops.com", "cryptork.tech", "ufheur678.store", "lavenderspa586.com", "scandicinvestmentholding.com", "youenfangtex.com", "gratefulgrandmas.com", "ampersandtalent.net", "wippychick.com", "stamping.digital", "trixes.net", "popinticket.com", "ivyleaguereading.com", "killerinktnpasumo3.xyz", "greatyuwx.com", "royaltortoisecookieco.online", "quinten-and-sam.com", "mobile-sh.com", "reacjs.com", "hongbufang.net", "winemenuimports.com", "nashuatelegrpah.com", "nicorgaa.com", "outlanfd.com", "personalitideal.com", "mhhj666.com", "themethodcollective.com", "36536a.com", "bijit.xyz", "yoursinsoccer.net", "cryptoducks.club", "defuw.com", "kangley.net", "hacvm.com", "zhouyihong.top", "takut5.com", "kreditnekarticers.com", "koigo-wp.com", "52byhx.com", "phaghpanah.com", "apqlds.com", "karxsba2ix.xyz", "demasinfimo.quest", "unitytrstbnk.com", "panasonic-hcm.com", "27530amethystway.com", "idealftz.xyz", "conventionline.com"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x37a30:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x37dba:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x60850:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x60bda:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x88670:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x889fa:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x43acd:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x6c8ed:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x9470d:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x435b9:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x6c3d9:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x941f9:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x43bcf:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x6c9ef:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x9480f:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x43d47:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x6cb67:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x94987:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x387d2:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x615f2:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x89412:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x45ef1:$sqlite3step: 68 34 1C 7B E1
    • 0x46004:$sqlite3step: 68 34 1C 7B E1
    • 0x6ed11:$sqlite3step: 68 34 1C 7B E1
    • 0x6ee24:$sqlite3step: 68 34 1C 7B E1
    • 0x96b31:$sqlite3step: 68 34 1C 7B E1
    • 0x96c44:$sqlite3step: 68 34 1C 7B E1
    • 0x45f20:$sqlite3text: 68 38 2A 90 C5
    • 0x46045:$sqlite3text: 68 38 2A 90 C5
    • 0x6ed40:$sqlite3text: 68 38 2A 90 C5
    • 0x6ee65:$sqlite3text: 68 38 2A 90 C5
    • 0x96b60:$sqlite3text: 68 38 2A 90 C5
    • 0x96c85:$sqlite3text: 68 38 2A 90 C5
    • 0x45f33:$sqlite3blob: 68 53 D8 7F 8C
    • 0x4605b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x6ed53:$sqlite3blob: 68 53 D8 7F 8C
    • 0x6ee7b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x96b73:$sqlite3blob: 68 53 D8 7F 8C
    • 0x96c9b:$sqlite3blob: 68 53 D8 7F 8C
    00000000.00000002.284504751.0000000007630000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_zgRATDetects zgRATditekSHen
    • 0x5178f:$s1: file:///
    • 0x5169f:$s2: {11111-22222-10009-11112}
    • 0x5171f:$s3: {11111-22222-50001-00000}
    • 0x4eb41:$s4: get_Module
    • 0x4ef87:$s5: Reverse
    • 0x50fce:$s6: BlockCopy
    • 0x50e12:$s7: ReadByte
    • 0x517a1:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
    00000000.00000002.279126660.0000000002CE6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Click to see the 11 entries
      SourceRuleDescriptionAuthorStrings
      4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x7808:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x7b92:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x138a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x13391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x139a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x13b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x85aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1260c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0x9322:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x18d97:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x19e3a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x15cc9:$sqlite3step: 68 34 1C 7B E1
        • 0x15ddc:$sqlite3step: 68 34 1C 7B E1
        • 0x15cf8:$sqlite3text: 68 38 2A 90 C5
        • 0x15e1d:$sqlite3text: 68 38 2A 90 C5
        • 0x15d0b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x15e33:$sqlite3blob: 68 53 D8 7F 8C
        4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8992:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x146a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x147a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x93aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa122:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x19b97:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1ac3a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 31 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.gulabmonga.com/gfge/"], "decoy": ["loopcoalition.com", "hd126.com", "elioguion.net", "defitrader.academy", "exactemi.com", "angeloacierno.com", "range4tis.com", "ilovekuduro.us", "mydealsstation.com", "jerichoprinting.com", "birdcafe605.com", "freemansrepublic.com", "driedplasma.com", "valuableconnect.com", "anthonyvid.xyz", "theydo.support", "devnetsecops.com", "cryptork.tech", "ufheur678.store", "lavenderspa586.com", "scandicinvestmentholding.com", "youenfangtex.com", "gratefulgrandmas.com", "ampersandtalent.net", "wippychick.com", "stamping.digital", "trixes.net", "popinticket.com", "ivyleaguereading.com", "killerinktnpasumo3.xyz", "greatyuwx.com", "royaltortoisecookieco.online", "quinten-and-sam.com", "mobile-sh.com", "reacjs.com", "hongbufang.net", "winemenuimports.com", "nashuatelegrpah.com", "nicorgaa.com", "outlanfd.com", "personalitideal.com", "mhhj666.com", "themethodcollective.com", "36536a.com", "bijit.xyz", "yoursinsoccer.net", "cryptoducks.club", "defuw.com", "kangley.net", "hacvm.com", "zhouyihong.top", "takut5.com", "kreditnekarticers.com", "koigo-wp.com", "52byhx.com", "phaghpanah.com", "apqlds.com", "karxsba2ix.xyz", "demasinfimo.quest", "unitytrstbnk.com", "panasonic-hcm.com", "27530amethystway.com", "idealftz.xyz", "conventionline.com"]}
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeReversingLabs: Detection: 41%
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeAvira: detected
          Source: www.gulabmonga.com/gfge/Avira URL Cloud: Label: malware
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeJoe Sandbox ML: detected
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.279519488.0000000000E26000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.282777820.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.277122320.0000000000C8F000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.283522610.00000000010DF000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.279519488.0000000000E26000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.282777820.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.277122320.0000000000C8F000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.283522610.00000000010DF000.00000040.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4x nop then pop edi

          Networking

          barindex
          Source: Malware configuration extractorURLs: www.gulabmonga.com/gfge/
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.7630000.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3ebe1e0.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3f46e00.1.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.7630000.11.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3f46e00.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d453e8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d457f4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d46000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3ebe1e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.284504751.0000000007630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
          Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.7630000.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3ebe1e0.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3f46e00.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.7630000.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3f46e00.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d453e8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d457f4.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d46000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
          Source: 0.3.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3ebe1e0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.284504751.0000000007630000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 0_2_0132E778
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 0_2_0132E768
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00401030
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041BA9D
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041CB90
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00408C6B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00408C70
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00402D87
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00402D90
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00402FB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004185D0 NtCreateFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00418680 NtReadFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00418700 NtClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004187B0 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004186FA NtClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004187AA NtAllocateVirtualMemory,
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.278113921.0000000000972000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCOMServerEn.exeF vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.284504751.0000000007630000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000003.268214252.0000000003D53000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.279929044.0000000000F45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000000.272909693.00000000005B2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCOMServerEn.exeF vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.284160709.000000000126F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.283522610.00000000010DF000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.277427240.0000000000DA5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeBinary or memory string: OriginalFilenameCOMServerEn.exeF vs SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeReversingLabs: Detection: 41%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe:Zone.IdentifierJump to behavior
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Variant.Strictor.272734.30355.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@3/1@0/0
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeMutant created: \Sessions\1\BaseNamedObjects\GQUPSYLANzmrKS
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.279519488.0000000000E26000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.282777820.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.277122320.0000000000C8F000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.283522610.00000000010DF000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.279519488.0000000000E26000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.282777820.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000003.277122320.0000000000C8F000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000004.00000002.283522610.00000000010DF000.00000040.00000800.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.970000.0.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.970000.0.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.7.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.1.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.5.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.1.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.0.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.9.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.3.unpack, MainForm.cs.Net Code: DateTime System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 0_2_0132E298 push 2402B6C3h; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 0_2_0132F550 push eax; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 0_2_0132F5F2 pushfd ; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041B87C push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041B812 push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041B81B push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0040C8D2 push esp; iretd
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041C905 push dword ptr [DE3B1691h]; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041612A push 78D33A13h; iretd
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004161B3 push 78D33A13h; iretd
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0040C2F8 push ds; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0040D417 push 00000060h; iretd
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041CDA5 push 073A5053h; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00414E92 push esp; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_00414EA2 push ds; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_0041B7C5 push eax; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.98237673455
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d453e8.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d457f4.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.2d46000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.279126660.0000000002CE6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Strictor.272734.30355.exe PID: 4812, type: MEMORYSTR
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279126660.0000000002CE6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279126660.0000000002CE6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeRDTSC instruction interceptor: First address: 0000000000408604 second address: 000000000040860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeRDTSC instruction interceptor: First address: 000000000040898E second address: 0000000000408994 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe TID: 3032Thread sleep time: -43731s >= -30000s
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe TID: 1960Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004088C0 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeThread delayed: delay time: 43731
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeThread delayed: delay time: 922337203685477
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeCode function: 4_2_004088C0 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.3e51c08.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath Interception111
          Process Injection
          1
          Masquerading
          OS Credential Dumping221
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
          Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)13
          Software Packing
          NTDS112
          System Information Discovery
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script111
          Process Injection
          LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common3
          Obfuscated Files or Information
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          SecuriteInfo.com.Variant.Strictor.272734.30355.exe41%ReversingLabsByteCode-MSIL.Trojan.Strictor
          SecuriteInfo.com.Variant.Strictor.272734.30355.exe100%AviraHEUR/AGEN.1221711
          SecuriteInfo.com.Variant.Strictor.272734.30355.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.7.unpack100%AviraHEUR/AGEN.1221711Download File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.1.unpack100%AviraHEUR/AGEN.1221711Download File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.5.unpack100%AviraHEUR/AGEN.1221711Download File
          4.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.1.unpack100%AviraHEUR/AGEN.1221711Download File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.0.unpack100%AviraHEUR/AGEN.1221711Download File
          0.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.970000.0.unpack100%AviraHEUR/AGEN.1221711Download File
          0.2.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.970000.0.unpack100%AviraHEUR/AGEN.1221711Download File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.9.unpack100%AviraHEUR/AGEN.1221711Download File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.2.unpack100%AviraHEUR/AGEN.1221711Download File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          4.0.SecuriteInfo.com.Variant.Strictor.272734.30355.exe.5b0000.3.unpack100%AviraHEUR/AGEN.1221711Download File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          www.gulabmonga.com/gfge/100%Avira URL Cloudmalware
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          www.gulabmonga.com/gfge/true
          • Avira URL Cloud: malware
          low
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.com/designersGSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designers/?SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.tiro.comSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.goodfont.co.krSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cnSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/frere-user.htmlSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers8SecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fonts.comSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sandoll.co.krSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleaseSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sakkal.comSecuriteInfo.com.Variant.Strictor.272734.30355.exe, 00000000.00000002.283550225.0000000006EF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              No contacted IP infos
                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:632534
                              Start date and time: 23/05/202218:48:192022-05-23 18:48:19 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 9m 17s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:SecuriteInfo.com.Variant.Strictor.272734.30355.11938 (renamed file extension from 11938 to exe)
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:25
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@3/1@0/0
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 36.8% (good quality ratio 35.4%)
                              • Quality average: 72.4%
                              • Quality standard deviation: 29.4%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • VT rate limit hit for: SecuriteInfo.com.Variant.Strictor.272734.30355.exe
                              TimeTypeDescription
                              18:49:37API Interceptor2x Sleep call for process: SecuriteInfo.com.Variant.Strictor.272734.30355.exe modified
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1308
                              Entropy (8bit):5.345811588615766
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                              MD5:2E016B886BDB8389D2DD0867BE55F87B
                              SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                              SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                              SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                              Malicious:true
                              Reputation:high, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.776603349690639
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              • Win32 Executable (generic) a (10002005/4) 49.78%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              File name:SecuriteInfo.com.Variant.Strictor.272734.30355.exe
                              File size:697344
                              MD5:f7b5a24637b27abfd5809a27997ea31d
                              SHA1:7230e7f3bcb4e57d73fedf3c0d85067e95761323
                              SHA256:ced900f9ec05901373c3ae09a06b3ef5ef958764f1fc551590b5f2a820f115a1
                              SHA512:959325d256c0ff26adbc7efd074545e76a2b0a8da970d02eab085247a19d158ff3e640fa04b5ac03f1076dd81282a2b79d4ebeed67b50d52bf03ad516b11e731
                              SSDEEP:12288:ii+Y9LG4kiVo8Bg+fK6NQrFECIPHSzqCG4NuOMHUSQSLLXE9D:ijY9y+Zg+fK6qru6WCG4NuO1SQSLLID
                              TLSH:87E4F0E0E550D21BEDB68AB08035EA34A2755ED8A0F1E54E55D4B8A337F329F10B3C97
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....H.b..............0..^...D.......}... ........@.. ....................................@................................
                              Icon Hash:614444494d55512b
                              Entrypoint:0x487dca
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x628B48F7 [Mon May 23 08:42:31 2022 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x87d780x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x880000x240c0.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x85dd00x85e00False0.977972178455data7.98237673455IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0x880000x240c00x24200False0.511657926038data6.11584329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xae0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_ICON0x882200x468GLS_BINARY_LSB_FIRST
                              RT_ICON0x886880x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4278913803, next used block 4278914060
                              RT_ICON0x897300x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4284900966, next used block 4291085508
                              RT_ICON0x8bcd80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4294704123, next used block 4294901502
                              RT_ICON0x8ff000x10828data
                              RT_ICON0xa07280xb402PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                              RT_GROUP_ICON0xabb2c0x5adata
                              RT_VERSION0xabb880x34cdata
                              RT_MANIFEST0xabed40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              DLLImport
                              mscoree.dll_CorExeMain
                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyrightCopyright 2018
                              Assembly Version1.0.0.0
                              InternalNameCOMServerEn.exe
                              FileVersion1.0.0.0
                              CompanyName
                              LegalTrademarks
                              Comments
                              ProductNameCIS501FinalProject
                              ProductVersion1.0.0.0
                              FileDescriptionCIS501FinalProject
                              OriginalFilenameCOMServerEn.exe
                              No network behavior found

                              Click to jump to process

                              Target ID:0
                              Start time:18:49:27
                              Start date:23/05/2022
                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe"
                              Imagebase:0x970000
                              File size:697344 bytes
                              MD5 hash:F7B5A24637B27ABFD5809A27997EA31D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.280007107.0000000003E51000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.284504751.0000000007630000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.279126660.0000000002CE6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.279186212.0000000002D40000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low

                              Target ID:4
                              Start time:18:49:41
                              Start date:23/05/2022
                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Strictor.272734.30355.exe
                              Imagebase:0x5b0000
                              File size:697344 bytes
                              MD5 hash:F7B5A24637B27ABFD5809A27997EA31D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.280674228.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.274944732.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                              • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.276081424.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                              Reputation:low

                              No disassembly