Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W32.AIDetectNet.01.24194.12957

Overview

General Information

Sample Name:SecuriteInfo.com.W32.AIDetectNet.01.24194.12957 (renamed file extension from 12957 to exe)
Analysis ID:635348
MD5:ac85e260ef18ab08b53e04177e8c04a9
SHA1:1137e2caa9848d3b804fecb01e12624bd5fb62bc
SHA256:0e3a4f080d2ff0bdfa0a7e39df4982232b2d19245e6355e49940c05becfeecc5
Tags:exe
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to call native functions
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cleanup
{"C2 list": ["www.commwealth-cba-au.com/smwr/"], "decoy": ["forex.exposed", "benditabrujaastrologia.com", "savannah-e.com", "cssdwljx.com", "floridayachtparty.com", "koru-purple.com", "caddyscholarship.com", "mywinningkidssedallas.com", "operati.club", "kinvuehealth.biz", "littlebearbicycleoutfitters.com", "btcfarsi.com", "poppyteez.com", "roninwallettsmoney.com", "greedyp.one", "kangshifuqwdz.com", "osamirin.xyz", "leaddoggq.com", "cherrypickmerch.com", "myqmetrbs.com", "melonslot.info", "mommyheartstacos.com", "samcsu.xyz", "702slingshots.com", "gnw8.com", "officegame.xyz", "lalunamesa.com", "alignedtalent.tech", "djzemi.com", "anti-tracker-test.com", "estilobank.com", "n4q7.com", "404035.com", "relaxtionary.com", "beastmodewellness.com", "lskdojfjf3k35.com", "mtyapialanya.com", "giftcardpulse.com", "yy6333.com", "sdcychemical.com", "icarusexchange.info", "elementsfunding.com", "199yb.com", "beladicaseofertas.site", "bi11111.com", "esystemhr.com", "tsharedrop.com", "sattlerplastics.site", "walgreensrabenefit.com", "spatula11.com", "sunriseteam.info", "stephensonequipinc.com", "fashionsbyfleur.com", "aiscrofa.com", "shopmeccamarket.com", "physicistlakefront.com", "ivermectinsales.com", "perceptiv.academy", "davidgilbertcarpentryplus.com", "wynn12.com", "medicalofficeinsurance.online", "womenofwildpodcast.com", "neoneuphoria.com", "thedevonlabellady.online"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x11538:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x118d2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x3c358:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x3c6f2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x66178:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x66512:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x1ec75:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x49a95:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x738b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x1e721:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x49541:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x73361:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x1ed77:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x49b97:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x739b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1eeef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x49d0f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x73b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x122ea:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x3d10a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x66f2a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x21149:$sqlite3step: 68 34 1C 7B E1
    • 0x2125c:$sqlite3step: 68 34 1C 7B E1
    • 0x4bf69:$sqlite3step: 68 34 1C 7B E1
    • 0x4c07c:$sqlite3step: 68 34 1C 7B E1
    • 0x75d89:$sqlite3step: 68 34 1C 7B E1
    • 0x75e9c:$sqlite3step: 68 34 1C 7B E1
    • 0x21178:$sqlite3text: 68 38 2A 90 C5
    • 0x2129d:$sqlite3text: 68 38 2A 90 C5
    • 0x4bf98:$sqlite3text: 68 38 2A 90 C5
    • 0x4c0bd:$sqlite3text: 68 38 2A 90 C5
    • 0x75db8:$sqlite3text: 68 38 2A 90 C5
    • 0x75edd:$sqlite3text: 68 38 2A 90 C5
    • 0x2118b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x212b3:$sqlite3blob: 68 53 D8 7F 8C
    • 0x4bfab:$sqlite3blob: 68 53 D8 7F 8C
    • 0x4c0d3:$sqlite3blob: 68 53 D8 7F 8C
    • 0x75dcb:$sqlite3blob: 68 53 D8 7F 8C
    • 0x75ef3:$sqlite3blob: 68 53 D8 7F 8C
    0000000A.00000000.298671862.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000A.00000000.298671862.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8c08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8fa2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x16345:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15df1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x16447:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x165bf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x99ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1506c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa732:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b997:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1ca9a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 11 entries
      SourceRuleDescriptionAuthorStrings
      10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8c08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8fa2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x16345:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15df1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x16447:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x165bf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x99ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1506c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa732:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b997:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1ca9a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18819:$sqlite3step: 68 34 1C 7B E1
        • 0x1892c:$sqlite3step: 68 34 1C 7B E1
        • 0x18848:$sqlite3text: 68 38 2A 90 C5
        • 0x1896d:$sqlite3text: 68 38 2A 90 C5
        • 0x1885b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x18983:$sqlite3blob: 68 53 D8 7F 8C
        10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x7e08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x81a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15545:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14ff1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15647:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x157bf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x8bba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1426c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x9932:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1ab97:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1bc9a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 21 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.commwealth-cba-au.com/smwr/"], "decoy": ["forex.exposed", "benditabrujaastrologia.com", "savannah-e.com", "cssdwljx.com", "floridayachtparty.com", "koru-purple.com", "caddyscholarship.com", "mywinningkidssedallas.com", "operati.club", "kinvuehealth.biz", "littlebearbicycleoutfitters.com", "btcfarsi.com", "poppyteez.com", "roninwallettsmoney.com", "greedyp.one", "kangshifuqwdz.com", "osamirin.xyz", "leaddoggq.com", "cherrypickmerch.com", "myqmetrbs.com", "melonslot.info", "mommyheartstacos.com", "samcsu.xyz", "702slingshots.com", "gnw8.com", "officegame.xyz", "lalunamesa.com", "alignedtalent.tech", "djzemi.com", "anti-tracker-test.com", "estilobank.com", "n4q7.com", "404035.com", "relaxtionary.com", "beastmodewellness.com", "lskdojfjf3k35.com", "mtyapialanya.com", "giftcardpulse.com", "yy6333.com", "sdcychemical.com", "icarusexchange.info", "elementsfunding.com", "199yb.com", "beladicaseofertas.site", "bi11111.com", "esystemhr.com", "tsharedrop.com", "sattlerplastics.site", "walgreensrabenefit.com", "spatula11.com", "sunriseteam.info", "stephensonequipinc.com", "fashionsbyfleur.com", "aiscrofa.com", "shopmeccamarket.com", "physicistlakefront.com", "ivermectinsales.com", "perceptiv.academy", "davidgilbertcarpentryplus.com", "wynn12.com", "medicalofficeinsurance.online", "womenofwildpodcast.com", "neoneuphoria.com", "thedevonlabellady.online"]}
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeVirustotal: Detection: 31%Perma Link
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeReversingLabs: Detection: 26%
          Source: Yara matchFile source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.298671862.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.301741278.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.298185679.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: www.commwealth-cba-au.com/smwr/Avira URL Cloud: Label: phishing
          Source: www.commwealth-cba-au.com/smwr/Virustotal: Detection: 6%Perma Link
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeJoe Sandbox ML: detected
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.4.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: IServiceProvi.pdb source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000003.299161872.00000000013D9000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000002.302487104.0000000001710000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000003.300721098.0000000001577000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000002.303083966.000000000182F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000003.299161872.00000000013D9000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000002.302487104.0000000001710000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000003.300721098.0000000001577000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000002.303083966.000000000182F000.00000040.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 4x nop then pop ebx

          Networking

          barindex
          Source: Malware configuration extractorURLs: www.commwealth-cba-au.com/smwr/
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.299899600.0000000005C60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.271142884.0000000005C6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.TTF
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.268320197.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276029305.0000000005C9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.268320197.0000000005C9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269530321.0000000005C9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.htmlX4
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269072747.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269013352.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269126032.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269174089.0000000005C9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersE
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276091209.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276029305.0000000005C9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers_
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269675889.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269723077.0000000005C9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersl#
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269072747.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269013352.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269126032.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.268902046.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269174089.0000000005C9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersz
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.270438377.0000000005C9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers~
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.306903174.0000000005C6C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.299986023.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.278971595.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276139218.0000000005C66000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.284163429.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276289023.0000000005C6C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.299899600.0000000005C60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.271142884.0000000005C6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsd
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.271142884.0000000005C6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.como
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.271142884.0000000005C6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsiefRPho
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.271142884.0000000005C6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comueTF
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.306903174.0000000005C6C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.299986023.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.278971595.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276139218.0000000005C66000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.284163429.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276289023.0000000005C6C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.299899600.0000000005C60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comuemQ
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.262954837.0000000005C64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.262954837.0000000005C64000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263269492.0000000005C67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263072140.0000000005C66000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263158470.0000000005C67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263201849.0000000005C67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.262993160.0000000005C64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn7R
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.262954837.0000000005C64000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263269492.0000000005C67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263072140.0000000005C66000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263158470.0000000005C67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263201849.0000000005C67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.262993160.0000000005C64000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnu-e
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.266268752.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.266482682.0000000005C6C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.266179512.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.266268752.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.266179512.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.266268752.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/n-u
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.298671862.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.301741278.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.298185679.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.7640000.10.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.3e19698.5.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.7640000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.3e19698.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.3de2098.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
          Source: 00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000000.298671862.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000000.298671862.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.307980794.0000000007640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
          Source: 0000000A.00000002.301741278.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.301741278.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000000.298185679.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000000.298185679.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
          Source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.7640000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.3e19698.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.7640000.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.3e19698.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.3de2098.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000000.298671862.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000000.298671862.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.307980794.0000000007640000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
          Source: 0000000A.00000002.301741278.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.301741278.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000000.298185679.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000000.298185679.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 0_2_02BE81D6
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 0_2_02BE4304
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 0_2_02BE6750
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 0_2_02BE6740
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 0_2_05E50628
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 0_2_05E50040
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 0_2_05E5BB80
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 0_2_05E54B68
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 0_2_05E54B58
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 0_2_05E5B758
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 0_2_05E53118
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_00401030
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041DA02
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041EA3C
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_00409280
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0040DC20
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041DD23
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_00402D90
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041DE07
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041E7D2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_00402FB0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041A320 NtCreateFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041A3D0 NtReadFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041A450 NtClose,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041A500 NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041A31A NtCreateFile,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041A4FA NtAllocateVirtualMemory,
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041A57A NtAllocateVirtualMemory,
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000000.248743064.00000000007BC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIServiceProvi.exe" vs SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307980794.0000000007640000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.305828857.0000000003DE2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIVectorView.dllN vs SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000002.303791071.00000000019BF000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000000.296425380.0000000000B7C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIServiceProvi.exe" vs SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000003.301089716.0000000001696000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000003.299295732.00000000014EF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000002.303083966.000000000182F000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeBinary or memory string: OriginalFilenameIServiceProvi.exe" vs SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeVirustotal: Detection: 31%
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeReversingLabs: Detection: 26%
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@3/1@0/0
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, gH/kD.csCryptographic APIs: 'CreateDecryptor'
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, gH/kD.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.700000.0.unpack, gH/kD.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.700000.0.unpack, gH/kD.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.700000.0.unpack, gH/kD.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.700000.0.unpack, gH/kD.csCryptographic APIs: 'CreateDecryptor'
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.ac0000.9.unpack, gH/kD.csCryptographic APIs: 'CreateDecryptor'
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.ac0000.9.unpack, gH/kD.csCryptographic APIs: 'CreateDecryptor'
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.ac0000.1.unpack, gH/kD.csCryptographic APIs: 'CreateDecryptor'
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.ac0000.1.unpack, gH/kD.csCryptographic APIs: 'CreateDecryptor'
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.ac0000.2.unpack, gH/kD.csCryptographic APIs: 'CreateDecryptor'
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.ac0000.2.unpack, gH/kD.csCryptographic APIs: 'CreateDecryptor'
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: IServiceProvi.pdb source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000003.299161872.00000000013D9000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000002.302487104.0000000001710000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000003.300721098.0000000001577000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000002.303083966.000000000182F000.00000040.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000003.299161872.00000000013D9000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000002.302487104.0000000001710000.00000040.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000003.300721098.0000000001577000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 0000000A.00000002.303083966.000000000182F000.00000040.00000800.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, gH/kD.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.700000.0.unpack, gH/kD.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 0.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.700000.0.unpack, gH/kD.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.ac0000.9.unpack, gH/kD.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.ac0000.1.unpack, gH/kD.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.ac0000.2.unpack, gH/kD.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041790A push es; retf
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_00417185 push es; iretd
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041F2D8 push ebp; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041F2A7 push ebp; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041D672 push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041D67B push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041D625 push eax; ret
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_0041D6DC push eax; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.74063196542
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 00000000.00000002.302533701.0000000002C6D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.302576696.0000000002C92000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe PID: 3920, type: MEMORYSTR
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.302576696.0000000002C92000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.302533701.0000000002C6D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.302576696.0000000002C92000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.302533701.0000000002C6D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeRDTSC instruction interceptor: First address: 0000000000408C04 second address: 0000000000408C0A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeRDTSC instruction interceptor: First address: 0000000000408F9E second address: 0000000000408FA4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe TID: 6080Thread sleep time: -43731s >= -30000s
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe TID: 5288Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_00408ED0 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeThread delayed: delay time: 43731
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeThread delayed: delay time: 922337203685477
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.302533701.0000000002C6D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.302533701.0000000002C6D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.302533701.0000000002C6D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.302533701.0000000002C6D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeCode function: 10_2_00408ED0 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess queried: DebugPort
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.298671862.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.301741278.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.298185679.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.298671862.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.301741278.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.298185679.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath Interception111
          Process Injection
          1
          Masquerading
          OS Credential Dumping221
          Security Software Discovery
          Remote Services11
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
          Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
          Process Injection
          NTDS112
          System Information Discovery
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common3
          Obfuscated Files or Information
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items13
          Software Packing
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          SecuriteInfo.com.W32.AIDetectNet.01.24194.exe31%VirustotalBrowse
          SecuriteInfo.com.W32.AIDetectNet.01.24194.exe27%ReversingLabsByteCode-MSIL.Spyware.Noon
          SecuriteInfo.com.W32.AIDetectNet.01.24194.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.4.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          10.2.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          10.0.SecuriteInfo.com.W32.AIDetectNet.01.24194.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
          http://www.fontbureau.comueTF0%URL Reputationsafe
          http://www.fontbureau.comuemQ0%Avira URL Cloudsafe
          http://www.tiro.com0%URL Reputationsafe
          http://www.founder.com.cn/cn7R0%Avira URL Cloudsafe
          http://www.goodfont.co.kr0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
          http://www.fontbureau.coma0%URL Reputationsafe
          http://www.carterandcone.coml0%URL Reputationsafe
          http://www.sajatypeworks.com0%URL Reputationsafe
          http://www.typography.netD0%URL Reputationsafe
          http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
          www.commwealth-cba-au.com/smwr/7%VirustotalBrowse
          www.commwealth-cba-au.com/smwr/100%Avira URL Cloudphishing
          http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
          http://fontfabrik.com0%URL Reputationsafe
          http://www.founder.com.cn/cn0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
          http://www.jiyu-kobo.co.jp/n-u0%URL Reputationsafe
          http://www.fontbureau.comsiefRPho0%Avira URL Cloudsafe
          http://www.fontbureau.como0%URL Reputationsafe
          http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
          http://www.sandoll.co.kr0%URL Reputationsafe
          http://www.urwpp.deDPlease0%URL Reputationsafe
          http://www.zhongyicts.com.cn0%URL Reputationsafe
          http://www.sakkal.com0%URL Reputationsafe
          http://www.fontbureau.com.TTF0%URL Reputationsafe
          http://www.founder.com.cn/cnu-e0%Avira URL Cloudsafe
          http://www.fontbureau.comalsd0%URL Reputationsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          www.commwealth-cba-au.com/smwr/true
          • 7%, Virustotal, Browse
          • Avira URL Cloud: phishing
          low
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.fontbureau.comSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.299899600.0000000005C60000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.com/designersGSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designers/?SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.founder.com.cn/cn/bTheSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers?SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designers~SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.270438377.0000000005C9D000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designersESecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269072747.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269013352.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269126032.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269174089.0000000005C9D000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comueTFSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.271142884.0000000005C6C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comuemQSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.306903174.0000000005C6C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.299986023.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.278971595.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276139218.0000000005C66000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.284163429.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276289023.0000000005C6C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.299899600.0000000005C60000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.tiro.comSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn7RSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.262954837.0000000005C64000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263269492.0000000005C67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263072140.0000000005C66000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263158470.0000000005C67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263201849.0000000005C67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.262993160.0000000005C64000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designersSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.268320197.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276029305.0000000005C9B000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.goodfont.co.krSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jiyu-kobo.co.jp/jp/SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.266179512.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.266268752.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.comaSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.306903174.0000000005C6C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.299986023.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.278971595.0000000005C6D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276139218.0000000005C66000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.284163429.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276289023.0000000005C6C000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.299899600.0000000005C60000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comlSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersl#SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269675889.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269723077.0000000005C9D000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.sajatypeworks.comSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/cTheSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.comSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.262954837.0000000005C64000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-user.htmlSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designers/frere-user.htmlX4SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269530321.0000000005C9D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers_SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276091209.0000000005C9B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.276029305.0000000005C9B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.jiyu-kobo.co.jp/SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.266268752.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.266482682.0000000005C6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/n-uSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.266179512.0000000005C6B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.266268752.0000000005C6B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comsiefRPhoSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.271142884.0000000005C6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.comoSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.271142884.0000000005C6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fonts.comSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.sandoll.co.krSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.urwpp.deDPleaseSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designerszSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269072747.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269013352.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269126032.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.268902046.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.269174089.0000000005C9D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.zhongyicts.com.cnSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.sakkal.comSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000002.307326512.0000000006F52000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com.TTFSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.271142884.0000000005C6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.268320197.0000000005C9D000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cnu-eSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.262954837.0000000005C64000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263269492.0000000005C67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263072140.0000000005C66000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263158470.0000000005C67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.263201849.0000000005C67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.262993160.0000000005C64000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.comalsdSecuriteInfo.com.W32.AIDetectNet.01.24194.exe, 00000000.00000003.271142884.0000000005C6C000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            No contacted IP infos
                                            Joe Sandbox Version:34.0.0 Boulder Opal
                                            Analysis ID:635348
                                            Start date and time: 27/05/202219:41:512022-05-27 19:41:51 +02:00
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 8m 48s
                                            Hypervisor based Inspection enabled:false
                                            Report type:light
                                            Sample file name:SecuriteInfo.com.W32.AIDetectNet.01.24194.12957 (renamed file extension from 12957 to exe)
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                            Number of analysed new started processes analysed:25
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@3/1@0/0
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HDC Information:
                                            • Successful, ratio: 24.8% (good quality ratio 23.5%)
                                            • Quality average: 70.6%
                                            • Quality standard deviation: 30.3%
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 0
                                            • Number of non-executed functions: 0
                                            Cookbook Comments:
                                            • Adjust boot time
                                            • Enable AMSI
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                            • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            TimeTypeDescription
                                            19:43:20API Interceptor1x Sleep call for process: SecuriteInfo.com.W32.AIDetectNet.01.24194.exe modified
                                            No context
                                            No context
                                            No context
                                            No context
                                            No context
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1308
                                            Entropy (8bit):5.345811588615766
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                            MD5:2E016B886BDB8389D2DD0867BE55F87B
                                            SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                            SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                            SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.742642857816063
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Windows Screen Saver (13104/52) 0.07%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            File name:SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
                                            File size:779776
                                            MD5:ac85e260ef18ab08b53e04177e8c04a9
                                            SHA1:1137e2caa9848d3b804fecb01e12624bd5fb62bc
                                            SHA256:0e3a4f080d2ff0bdfa0a7e39df4982232b2d19245e6355e49940c05becfeecc5
                                            SHA512:0311f7aa0c464d0d82b14f56fb116d61414be43621bcb84072795a0760ecb36ecdeacfc4d98444cbf1716caac16a045f0b34aad994ca3bbd02fa9a34ca2e7652
                                            SSDEEP:12288:Moa7mYn3GNG2p0I8WRnyGTd+p2YH0UUO4NQ4mYvZ0obd:Mf7mYWNG80I8W5yGTwp25UUO4C4mYxjd
                                            TLSH:D7F4E06A76679E03C11823B480C2E41407F96107A573E3C76FC761D72B1ABE59EC9B8B
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............0......Z........... ........@.. .......................@............@................................
                                            Icon Hash:4462f276dcec30e6
                                            Entrypoint:0x4ba9be
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                            Time Stamp:0x6290E388 [Fri May 27 14:43:20 2022 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:v4.0.30319
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xba9700x4b.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x57c0.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xc20000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xba9230x1c.text
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xb89c40xb8a00False0.881581383294data7.74063196542IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .rsrc0xbc0000x57c00x5800False0.964621803977data7.89130545967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xc20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountry
                                            RT_ICON0xbc1300x51a3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                            RT_GROUP_ICON0xc12d40x14data
                                            RT_VERSION0xc12e80x2ecdata
                                            RT_MANIFEST0xc15d40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            DescriptionData
                                            Translation0x0000 0x04b0
                                            LegalCopyright
                                            Assembly Version1.0.0.0
                                            InternalNameIServiceProvi.exe
                                            FileVersion1.0.0.0
                                            CompanyName
                                            LegalTrademarks
                                            Comments
                                            ProductName
                                            ProductVersion1.0.0.0
                                            FileDescription
                                            OriginalFilenameIServiceProvi.exe
                                            No network behavior found

                                            Click to jump to process

                                            Target ID:0
                                            Start time:19:43:01
                                            Start date:27/05/2022
                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe"
                                            Imagebase:0x700000
                                            File size:779776 bytes
                                            MD5 hash:AC85E260EF18AB08B53E04177E8C04A9
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.303867401.0000000003C01000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.307980794.0000000007640000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.302533701.0000000002C6D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.302576696.0000000002C92000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low

                                            Target ID:10
                                            Start time:19:43:23
                                            Start date:27/05/2022
                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.24194.exe
                                            Imagebase:0xac0000
                                            File size:779776 bytes
                                            MD5 hash:AC85E260EF18AB08B53E04177E8C04A9
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000000.298671862.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000000.298671862.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000000.298671862.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.301741278.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.301741278.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.301741278.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                            • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000000.298185679.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000000.298185679.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                            • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000000.298185679.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                            Reputation:low

                                            No disassembly