Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.30092

Overview

General Information

Sample Name:SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.30092 (renamed file extension from 30092 to exe)
Analysis ID:635347
MD5:f5be926b8353b200b0d078b6bdbb2409
SHA1:082c34d23a644ed820470c67e7ab3ba47c3929e3
SHA256:e4769e3e2b77ecaf145799bbd14fc3ebe7b7032f12f34807c59f59cee8eb063d
Tags:exe
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
Tries to detect virtualization through RDTSC time measurements
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Drops PE files
Checks if the current process is being debugged
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe (PID: 6980 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe" MD5: F5BE926B8353B200B0D078B6BDBB2409)
    • powershell.exe (PID: 6456 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jndOnPqDCz.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 5988 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jndOnPqDCz" /XML "C:\Users\user\AppData\Local\Temp\tmp127A.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"C2 list": ["www.satoshika1966.com/oi25/"], "decoy": ["lawyers-tools-kit.com", "9fjca.com", "insurancewebforms.com", "trippinapetrlbe.xyz", "insurancebiography.com", "zb-yufeng.com", "5cidercircle.com", "sixthfleet.site", "jumple.net", "news-polygraph.com", "foresthillswoodworks.com", "matiagro.com", "lyndalloyd.com", "dianashairbraiding.com", "growmediaceylon.com", "sansinterprise.com", "bestonlinetravelsdeals.com", "eleganceresidences.site", "webstooge.com", "3pot.top", "remarksless.com", "herefun.xyz", "alekessentials.com", "nailsdonebypatty.com", "futureflipinternational.com", "globalmaintenancellc.com", "stakemyday.host", "spiritualitywithmartamaria.com", "convergeintl.com", "caminataporlaafasia.com", "azino777-kazinos563.win", "speedieb.com", "sjrz.net", "alternativewellnessspa.com", "xn--nachhilfe-zrich-9vb.net", "mytexdijital.com", "licabolodoces.com", "wydguardian.com", "sophiacarlisle.com", "circle-design.com", "varda-art-bazaar.com", "ananyashop.com", "0851yoga.com", "notveecon.xyz", "brainbasedeating.com", "sarsenet.com", "esiona.online", "tryaircrew.com", "bjguogai.com", "0086021.xyz", "serifcuvak.com", "walmart-tr.xyz", "eternal-lagoon.com", "elohimhealthandwellness.com", "startingover50plus.com", "wkiueatew.com", "jackbriody.com", "whmdkc.com", "xn--o9j5f5c2dse834zo8xashq.com", "energize2022.com", "jazz-brewery.com", "gancolombia.com", "marconbuildersltd.com", "gamingtechexperts.com"]}
SourceRuleDescriptionAuthorStrings
00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18849:$sqlite3step: 68 34 1C 7B E1
    • 0x1895c:$sqlite3step: 68 34 1C 7B E1
    • 0x18878:$sqlite3text: 68 38 2A 90 C5
    • 0x1899d:$sqlite3text: 68 38 2A 90 C5
    • 0x1888b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x189b3:$sqlite3blob: 68 53 D8 7F 8C
    00000000.00000002.487282650.0000000003A41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000000.00000002.487282650.0000000003A41000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x42658:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x428d2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x70c78:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x70ef2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9e298:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9e512:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x4e405:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x7ca25:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0xaa045:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x4def1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x7c511:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0xa9b31:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x4e507:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x7cb27:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0xaa147:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x4e67f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x7cc9f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xaa2bf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x432ea:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x7190a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x9ef2a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      Click to see the 10 entries
      SourceRuleDescriptionAuthorStrings
      6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x148b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x143a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x149b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x979a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1361c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa493:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1ab27:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1bb2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x17a49:$sqlite3step: 68 34 1C 7B E1
        • 0x17b5c:$sqlite3step: 68 34 1C 7B E1
        • 0x17a78:$sqlite3text: 68 38 2A 90 C5
        • 0x17b9d:$sqlite3text: 68 38 2A 90 C5
        • 0x17a8b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17bb3:$sqlite3blob: 68 53 D8 7F 8C
        6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b927:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c92a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 25 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.satoshika1966.com/oi25/"], "decoy": ["lawyers-tools-kit.com", "9fjca.com", "insurancewebforms.com", "trippinapetrlbe.xyz", "insurancebiography.com", "zb-yufeng.com", "5cidercircle.com", "sixthfleet.site", "jumple.net", "news-polygraph.com", "foresthillswoodworks.com", "matiagro.com", "lyndalloyd.com", "dianashairbraiding.com", "growmediaceylon.com", "sansinterprise.com", "bestonlinetravelsdeals.com", "eleganceresidences.site", "webstooge.com", "3pot.top", "remarksless.com", "herefun.xyz", "alekessentials.com", "nailsdonebypatty.com", "futureflipinternational.com", "globalmaintenancellc.com", "stakemyday.host", "spiritualitywithmartamaria.com", "convergeintl.com", "caminataporlaafasia.com", "azino777-kazinos563.win", "speedieb.com", "sjrz.net", "alternativewellnessspa.com", "xn--nachhilfe-zrich-9vb.net", "mytexdijital.com", "licabolodoces.com", "wydguardian.com", "sophiacarlisle.com", "circle-design.com", "varda-art-bazaar.com", "ananyashop.com", "0851yoga.com", "notveecon.xyz", "brainbasedeating.com", "sarsenet.com", "esiona.online", "tryaircrew.com", "bjguogai.com", "0086021.xyz", "serifcuvak.com", "walmart-tr.xyz", "eternal-lagoon.com", "elohimhealthandwellness.com", "startingover50plus.com", "wkiueatew.com", "jackbriody.com", "whmdkc.com", "xn--o9j5f5c2dse834zo8xashq.com", "energize2022.com", "jazz-brewery.com", "gancolombia.com", "marconbuildersltd.com", "gamingtechexperts.com"]}
          Source: Yara matchFile source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.3a49930.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487282650.0000000003A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.481552223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.487067255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\jndOnPqDCz.exeJoe Sandbox ML: detected
          Source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: UCOMIRefl.pdb source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, jndOnPqDCz.exe.0.dr
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000002.487861193.000000000119F000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000003.485223288.0000000000EE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000003.482521054.0000000000D47000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000002.487506736.0000000001080000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000002.487861193.000000000119F000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000003.485223288.0000000000EE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000003.482521054.0000000000D47000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000002.487506736.0000000001080000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: UCOMIRefl.pdbh source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, jndOnPqDCz.exe.0.dr
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 4x nop then pop esi
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 4x nop then pop edi

          Networking

          barindex
          Source: Malware configuration extractorURLs: www.satoshika1966.com/oi25/
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.486729081.0000000002AAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.440298343.00000000058F2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.440111545.00000000058F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.htmlp
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.442287402.00000000058F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.442287402.00000000058F2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.442429609.00000000058F3000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.442570461.00000000058F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frer:
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.486578332.0000000001097000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comueoQ
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.435142223.000000000590B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.435211213.000000000590B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.435103153.000000000590B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comc
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.435361684.000000000590B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comn
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.437707039.00000000058FE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.437360666.00000000058FD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.437707039.00000000058FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/K
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.437360666.00000000058FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn=n
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.443791485.00000000058F4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.443550368.00000000058F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.437795767.00000000058F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comD
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.437795767.00000000058F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comfc
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.442785550.00000000058F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deMT
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.3a49930.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487282650.0000000003A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.481552223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.487067255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.7490000.10.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.7490000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.3a49930.5.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.3a49930.5.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.3c67358.7.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.3c67358.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.2ad4968.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
          Source: 00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.487282650.0000000003A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.487282650.0000000003A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000000.481552223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000000.481552223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.487067255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.487067255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.491584265.0000000007490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.7490000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.7490000.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.3a49930.5.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.3a49930.5.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.3c67358.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.3c67358.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.2ad4968.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
          Source: 00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.487282650.0000000003A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.487282650.0000000003A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000000.481552223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000000.481552223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.487067255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.487067255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.491584265.0000000007490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 0_2_005B476D
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 0_2_00D86E58
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 0_2_00D86E48
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 0_2_00D870F8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 0_2_00D870E7
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 0_2_04EB6180
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 0_2_04EB6190
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 0_2_04EB4DB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041D819
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0040102F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_00401030
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041E8C2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041EC43
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_00402D90
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_00409E5B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_00409E60
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041DF8D
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_00402FB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0054476D
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041A360 NtCreateFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041A410 NtReadFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041A490 NtClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041A540 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041A35A NtCreateFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041A40A NtReadFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041A48A NtClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041A53A NtAllocateVirtualMemory,
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.487898059.0000000003C53000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000000.425908567.000000000066E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUCOMIRefl.exe" vs SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491584265.0000000007490000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000000.479809596.00000000005FE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUCOMIRefl.exe" vs SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000002.489446353.000000000132F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000002.487861193.000000000119F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000003.485986749.0000000001004000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000003.482974921.0000000000E5D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeBinary or memory string: OriginalFilenameUCOMIRefl.exe" vs SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: jndOnPqDCz.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeJump to behavior
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe "C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jndOnPqDCz.exe
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jndOnPqDCz" /XML "C:\Users\user\AppData\Local\Temp\tmp127A.tmp
          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jndOnPqDCz.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jndOnPqDCz" /XML "C:\Users\user\AppData\Local\Temp\tmp127A.tmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeFile created: C:\Users\user\AppData\Roaming\jndOnPqDCz.exeJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeFile created: C:\Users\user\AppData\Local\Temp\tmp127A.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@9/8@0/0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6524:120:WilError_01
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6468:120:WilError_01
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, CM/OC.csCryptographic APIs: 'CreateDecryptor'
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, CM/OC.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.5b0000.0.unpack, CM/OC.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.5b0000.0.unpack, CM/OC.csCryptographic APIs: 'CreateDecryptor'
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.540000.7.unpack, CM/OC.csCryptographic APIs: 'CreateDecryptor'
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.540000.7.unpack, CM/OC.csCryptographic APIs: 'CreateDecryptor'
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.540000.1.unpack, CM/OC.csCryptographic APIs: 'CreateDecryptor'
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.540000.1.unpack, CM/OC.csCryptographic APIs: 'CreateDecryptor'
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: UCOMIRefl.pdb source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, jndOnPqDCz.exe.0.dr
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000002.487861193.000000000119F000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000003.485223288.0000000000EE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000003.482521054.0000000000D47000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000002.487506736.0000000001080000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000002.487861193.000000000119F000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000003.485223288.0000000000EE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000003.482521054.0000000000D47000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000006.00000002.487506736.0000000001080000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: UCOMIRefl.pdbh source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, jndOnPqDCz.exe.0.dr

          Data Obfuscation

          barindex
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, CM/OC.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.5b0000.0.unpack, CM/OC.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.540000.7.unpack, CM/OC.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.540000.1.unpack, CM/OC.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_00417200 push eax; iretd
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041D4B5 push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041D56C push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041D502 push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_0041D50B push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_00416655 push cs; retf
          Source: initial sampleStatic PE information: section name: .text entropy: 7.7430802552
          Source: initial sampleStatic PE information: section name: .text entropy: 7.7430802552
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeFile created: C:\Users\user\AppData\Roaming\jndOnPqDCz.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jndOnPqDCz" /XML "C:\Users\user\AppData\Local\Temp\tmp127A.tmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.2ad4968.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.486729081.0000000002AAD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe PID: 6980, type: MEMORYSTR
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.486729081.0000000002AAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.486729081.0000000002AAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeRDTSC instruction interceptor: First address: 0000000000409B7E second address: 0000000000409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe TID: 6984Thread sleep time: -43731s >= -30000s
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe TID: 7036Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5984Thread sleep time: -12912720851596678s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6544Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_00409AB0 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4351
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1723
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeThread delayed: delay time: 43731
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.486729081.0000000002AAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.486729081.0000000002AAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.486179414.0000000000CE9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0x
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.486729081.0000000002AAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.486729081.0000000002AAD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeCode function: 6_2_00409AB0 rdtsc
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jndOnPqDCz.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jndOnPqDCz.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jndOnPqDCz.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jndOnPqDCz" /XML "C:\Users\user\AppData\Local\Temp\tmp127A.tmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.3a49930.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487282650.0000000003A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.481552223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.487067255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.3a49930.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487282650.0000000003A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.481552223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.487067255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          111
          Process Injection
          1
          Masquerading
          OS Credential Dumping1
          Query Registry
          Remote Services11
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Scheduled Task/Job
          11
          Disable or Modify Tools
          LSASS Memory221
          Security Software Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
          Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
          Process Injection
          NTDS31
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common3
          Obfuscated Files or Information
          Cached Domain Credentials1
          File and Directory Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items13
          Software Packing
          DCSync112
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\jndOnPqDCz.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLinkDownload
          6.2.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          6.0.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://www.fonts.comc0%URL Reputationsafe
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.founder.com.cn/cn/K0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.tiro.comfc0%Avira URL Cloudsafe
          http://www.urwpp.deMT0%Avira URL Cloudsafe
          http://www.tiro.comD0%Avira URL Cloudsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.fontbureau.comueoQ0%Avira URL Cloudsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.ascendercorp.com/typedesigners.htmlp0%Avira URL Cloudsafe
          http://www.monotype.0%URL Reputationsafe
          http://www.founder.com.cn/cn=n0%Avira URL Cloudsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.fonts.comn0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          www.satoshika1966.com/oi25/0%Avira URL Cloudsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          www.satoshika1966.com/oi25/true
          • Avira URL Cloud: safe
          low
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.com/designersGSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designers/?SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fonts.comcSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.435103153.000000000590B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/frer:SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.442287402.00000000058F2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.442429609.00000000058F3000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.442570461.00000000058F3000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designers?SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/KSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.437707039.00000000058FE000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.goodfont.co.krSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.tiro.comfcSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.437795767.00000000058F2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.urwpp.deMTSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.442785550.00000000058F4000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.tiro.comDSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.437795767.00000000058F2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.carterandcone.comlSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comueoQSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.486578332.0000000001097000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.sajatypeworks.comSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.443791485.00000000058F4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.437707039.00000000058FE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.437360666.00000000058FD000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designers/cabarga.htmlSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.442287402.00000000058F2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.ascendercorp.com/typedesigners.htmlpSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.440298343.00000000058F2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.440111545.00000000058F2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.monotype.SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.443550368.00000000058F5000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn=nSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.437360666.00000000058FD000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fonts.comnSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.435361684.000000000590B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers8SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fonts.comSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.435142223.000000000590B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000003.435211213.000000000590B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sandoll.co.krSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleaseSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.zhongyicts.com.cnSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.486729081.0000000002AAD000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sakkal.comSecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe, 00000000.00000002.491051570.0000000006CC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    No contacted IP infos
                                    Joe Sandbox Version:34.0.0 Boulder Opal
                                    Analysis ID:635347
                                    Start date and time: 27/05/202219:40:322022-05-27 19:40:32 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 9m 11s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.30092 (renamed file extension from 30092 to exe)
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:16
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@9/8@0/0
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:
                                    • Successful, ratio: 24.2% (good quality ratio 22.7%)
                                    • Quality average: 70%
                                    • Quality standard deviation: 30.7%
                                    HCA Information:
                                    • Successful, ratio: 98%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • VT rate limit hit for: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
                                    TimeTypeDescription
                                    19:41:55API Interceptor1x Sleep call for process: SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe modified
                                    19:42:06API Interceptor35x Sleep call for process: powershell.exe modified
                                    No context
                                    No context
                                    No context
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:modified
                                    Size (bytes):1308
                                    Entropy (8bit):5.345811588615766
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                    MD5:2E016B886BDB8389D2DD0867BE55F87B
                                    SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                    SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                    SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):22188
                                    Entropy (8bit):5.601649796735967
                                    Encrypted:false
                                    SSDEEP:384:9tCDLqcc5Z1wWSN7CSYS0ngjultIA47nv3g3hInAML+6fmAV7aWDdOZQvnI+++g:H5gWYWTgClt7c667KepWp+g
                                    MD5:0DF2852803B88D3A7C83277BBC4EE319
                                    SHA1:72AB7A514B643728A5E9CC555C3B47A0E01B77B1
                                    SHA-256:E3CE18F0CCE672E8CDEEB077BC202FE1DA48CD86F0C44518E7B4F2D657369C71
                                    SHA-512:731C6ED1B0B227917BA834233830EDB62E9D1CE77B1B24A5DA2C83C31D89BD51D64A000D82787D3A6DFF3EC22C3A061F1177C393DF747A7DEC5EA0485F0221B6
                                    Malicious:false
                                    Reputation:low
                                    Preview:@...e...........d.......K.7...........X...*..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:very short file (no magic)
                                    Category:dropped
                                    Size (bytes):1
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:3:U:U
                                    MD5:C4CA4238A0B923820DCC509A6F75849B
                                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:1
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:very short file (no magic)
                                    Category:dropped
                                    Size (bytes):1
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:3:U:U
                                    MD5:C4CA4238A0B923820DCC509A6F75849B
                                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                    Malicious:false
                                    Preview:1
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
                                    File Type:XML 1.0 document, ASCII text
                                    Category:dropped
                                    Size (bytes):1601
                                    Entropy (8bit):5.135759873609857
                                    Encrypted:false
                                    SSDEEP:24:2di4+S2qh/a1Kby1moqUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtJxvn:cgeCaYrFdOFzOzN33ODOiDdKrsuT/v
                                    MD5:CD89408FF92E1E9E12850EBF1C6F344C
                                    SHA1:8353B8DBCE3B8E7628F3CB83A10684041283DB1D
                                    SHA-256:A07AFEF1B4ABE13D4FFE7DD1E4701B00D82178961EDB04B10F44DB61DD833E94
                                    SHA-512:D888D0C215B6E90DF4F163EFC9C2470EC6C4E4204B27DE4A683A347A915F026DA6181246DA71DD93C7588F5EA9B3B4B541697B48F7D838CDE9F82791078E80FD
                                    Malicious:true
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>.
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):787968
                                    Entropy (8bit):7.744917884710675
                                    Encrypted:false
                                    SSDEEP:12288:X9T+WDarHZNZS+r30hma4ubokv2LrEeGJNI6fWx4VWZo9twO0zEuqD:XZRGZdkhmMbok+LQVIQZUeCwF
                                    MD5:F5BE926B8353B200B0D078B6BDBB2409
                                    SHA1:082C34D23A644ED820470C67E7AB3BA47C3929E3
                                    SHA-256:E4769E3E2B77ECAF145799BBD14FC3EBE7B7032F12F34807C59F59CEE8EB063D
                                    SHA-512:5FCE70A347883DFC94A2855C5C65AA578AA73C3732FEAC539C6306353D5BF8CC44BEB383C713955BAF88F7A5E5B6D7567783D10C4E887B3F026BC00EF64C57B0
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Y.b..............0......Z........... ........@.. .......................`............@.................................@...K........W...................@....................................................... ............... ..H............text........ ...................... ..`.rsrc....W.......X..................@..@.reloc.......@......................@..B................p.......H.......,(...{.............7#...........................................0../.......(....8.....(....8....*.....%..}......}....8......0............{.........8....8....8......*...0..~.......88.......E........8.....8....8.....*...}....8......9....8........8.......{....:.....8.....{....}.... ....(....9....& ....8.......0..........8......*..(......8....8....8......(......8......&~.......*...~....*..(....8......}....8.....(....8.....*...(....8.......N..o....(....&8....*.0..........
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):5799
                                    Entropy (8bit):5.396460917709077
                                    Encrypted:false
                                    SSDEEP:96:BZ2B/wNWqDo1ZwWZs/wNWqDo1Z6G0OjZ3/wNWqDo1ZWveeQZK:0
                                    MD5:29B9E05A61294F6C8C93B962D390EFD8
                                    SHA1:60FFD9FEF6B98DAE5BEFD477DB8390A034F10CEF
                                    SHA-256:5057D27C703EC4D7C994377BA242681836D9B1BAC3393277C6579FCD8B0BA99D
                                    SHA-512:908989D3FE0A41A1C5C59C1A90D4499F4F23C730961FC7778149914259F687BF00F86F6C84C838FA2E322A93CD3A58EFD0C43488D7475F821DA97D0514FFBD5D
                                    Malicious:false
                                    Preview:.**********************..Windows PowerShell transcript start..Start time: 20220527194206..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 045012 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\jndOnPqDCz.exe..Process ID: 6456..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220527194206..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\jndOnPqDCz.exe..**********************..Windows PowerShell transcript start..Start time: 20220527194547..Username: computer\user..RunAs User: computer
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.744917884710675
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
                                    File size:787968
                                    MD5:f5be926b8353b200b0d078b6bdbb2409
                                    SHA1:082c34d23a644ed820470c67e7ab3ba47c3929e3
                                    SHA256:e4769e3e2b77ecaf145799bbd14fc3ebe7b7032f12f34807c59f59cee8eb063d
                                    SHA512:5fce70a347883dfc94a2855c5c65aa578aa73c3732feac539c6306353d5bf8cc44beb383c713955baf88f7a5e5b6d7567783d10c4e887b3f026bc00ef64c57b0
                                    SSDEEP:12288:X9T+WDarHZNZS+r30hma4ubokv2LrEeGJNI6fWx4VWZo9twO0zEuqD:XZRGZdkhmMbok+LQVIQZUeCwF
                                    TLSH:D9F4DF3972A6AE23C1A843B4C0D7A41803F565479132D7C7BFC729C62A867E64DCDB87
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Y..b..............0......Z........... ........@.. .......................`............@................................
                                    Icon Hash:4462f276dcec30e6
                                    Entrypoint:0x4bc98e
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0x6290E459 [Fri May 27 14:46:49 2022 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:v4.0.30319
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xbc9400x4b.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xbe0000x57b0.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xc40000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xbc8fb0x1c.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xba9940xbaa00False0.882103461989data7.7430802552IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .rsrc0xbe0000x57b00x5800False0.964710582386data7.8903360112IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xc40000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0xbe1300x51a3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                    RT_GROUP_ICON0xc32d40x14data
                                    RT_VERSION0xc32e80x2dcdata
                                    RT_MANIFEST0xc35c40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    DescriptionData
                                    Translation0x0000 0x04b0
                                    LegalCopyright
                                    Assembly Version1.0.0.0
                                    InternalNameUCOMIRefl.exe
                                    FileVersion1.0.0.0
                                    CompanyName
                                    LegalTrademarks
                                    Comments
                                    ProductName
                                    ProductVersion1.0.0.0
                                    FileDescription
                                    OriginalFilenameUCOMIRefl.exe
                                    No network behavior found

                                    Click to jump to process

                                    Target ID:0
                                    Start time:19:41:43
                                    Start date:27/05/2022
                                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe"
                                    Imagebase:0x5b0000
                                    File size:787968 bytes
                                    MD5 hash:F5BE926B8353B200B0D078B6BDBB2409
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.487282650.0000000003A41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.487282650.0000000003A41000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.487282650.0000000003A41000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.486729081.0000000002AAD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.491584265.0000000007490000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low

                                    Target ID:2
                                    Start time:19:42:03
                                    Start date:27/05/2022
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jndOnPqDCz.exe
                                    Imagebase:0x950000
                                    File size:430592 bytes
                                    MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:high

                                    Target ID:3
                                    Start time:19:42:03
                                    Start date:27/05/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff77f440000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:4
                                    Start time:19:42:04
                                    Start date:27/05/2022
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jndOnPqDCz" /XML "C:\Users\user\AppData\Local\Temp\tmp127A.tmp
                                    Imagebase:0xf70000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:5
                                    Start time:19:42:06
                                    Start date:27/05/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff77f440000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:6
                                    Start time:19:42:07
                                    Start date:27/05/2022
                                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Heur.MSIL.Bladabindi.1.11302.exe
                                    Imagebase:0x540000
                                    File size:787968 bytes
                                    MD5 hash:F5BE926B8353B200B0D078B6BDBB2409
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000000.481993204.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000000.481552223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000000.481552223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000000.481552223.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.487067255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.487067255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.487067255.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    No disassembly