Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:736956
MD5:9156fa044ec274f670095e43e205d137
SHA1:62107d1bd3cb01d59924433f1c8a97c7096d5fb7
SHA256:861751b8c762f3332f12c1f4ff45c3108357b1debbde2a07a5e9d44e806ce88d
Tags:exe
Infos:

Detection

Nymaim
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected unpacking (overwrites its own PE header)
Yara detected Nymaim
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
Drops PE files
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Uses taskkill to terminate processes
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to detect sandboxes (foreground window change detection)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 5676 cmdline: C:\Users\user\Desktop\file.exe MD5: 9156FA044EC274F670095E43E205D137)
    • is-SQE6E.tmp (PID: 5624 cmdline: "C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp" /SL4 $30224 "C:\Users\user\Desktop\file.exe" 2630911 52736 MD5: 7CD12C54A9751CA6EEE6AB0C85FB68F5)
      • fnsearcher68.exe (PID: 3080 cmdline: "C:\Program Files (x86)\fnSearcher\fnsearcher68.exe" MD5: 3FCA96750E2F656A73FBC6A896F53209)
        • 0JzI2az.exe (PID: 4556 cmdline: MD5: 3FB36CB0B7172E5298D2992D42984D06)
        • cmd.exe (PID: 4392 cmdline: "C:\Windows\System32\cmd.exe" /c taskkill /im "fnsearcher68.exe" /f & erase "C:\Program Files (x86)\fnSearcher\fnsearcher68.exe" & exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 3328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • taskkill.exe (PID: 4692 cmdline: taskkill /im "fnsearcher68.exe" /f MD5: 15E2E0ACD891510C6268CB8899F2A1A1)
  • cleanup
{"C2 addresses": ["45.139.105.1", "85.31.46.167"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.345115638.00000000037D0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
    00000002.00000002.343591826.0000000000400000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
      SourceRuleDescriptionAuthorStrings
      2.2.fnsearcher68.exe.37d0000.2.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
        2.2.fnsearcher68.exe.400000.0.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
          2.2.fnsearcher68.exe.400000.0.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
            2.2.fnsearcher68.exe.37d0000.2.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: file.exeReversingLabs: Detection: 17%
              Source: http://171.22.30.106/library.phpURL Reputation: Label: malware
              Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\0JzI2az.exeReversingLabs: Detection: 38%
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeJoe Sandbox ML: detected
              Source: 2.2.fnsearcher68.exe.10000000.6.unpackAvira: Label: TR/Crypt.XPACK.Gen8
              Source: 1.2.is-SQE6E.tmp.400000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 0.2.file.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 00000002.00000002.343591826.0000000000400000.00000040.00000001.01000000.00000007.sdmpMalware Configuration Extractor: Nymaim {"C2 addresses": ["45.139.105.1", "85.31.46.167"]}
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0045A060 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0045A114 ArcFourCrypt,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0045A12C ArcFourCrypt,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00403770 CryptAcquireContextW,CryptCreateHash,_mbstowcs,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,___std_exception_copy,

              Compliance

              barindex
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeUnpacked PE file: 2.2.fnsearcher68.exe.400000.0.unpack
              Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0046E2D4 FindFirstFileA,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0047694C FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00450EA4 FindFirstFileA,GetLastError,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0045E738 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00474BD0 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0045EBB4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0045D1B4 FindFirstFileA,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0048D260 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,Sleep,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_004241DD FindFirstFileExW,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_1000959D FindFirstFileExW,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile opened: C:\Users\user
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile opened: C:\Users\user\AppData
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile opened: C:\Users\user\AppData\Roaming
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows

              Networking

              barindex
              Source: Malware configuration extractorIPs: 45.139.105.1
              Source: Malware configuration extractorIPs: 85.31.46.167
              Source: Joe Sandbox ViewIP Address: 45.139.105.171 45.139.105.171
              Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
              Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
              Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
              Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
              Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
              Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
              Source: is-SQE6E.tmp, 00000001.00000002.347088234.0000000002254000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.fn-group.info/
              Source: file.exe, 00000000.00000003.250397670.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251914619.0000000003190000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.fn-group.info/-
              Source: file.exe, 00000000.00000003.250397670.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251914619.0000000003190000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.fn-group.info/-http://www.fn-group.info/fnsearcher/help.html1http://www.fn-group.info/fns
              Source: is-SQE6E.tmp, 00000001.00000002.346791616.000000000079A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fn-group.info/8
              Source: is-SQE6E.tmp, 00000001.00000002.347088234.0000000002254000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.fn-group.info/fnsearcher/download.html
              Source: is-SQE6E.tmp, 00000001.00000002.346974137.0000000000815000.00000004.00000020.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.346249515.0000000000815000.00000004.00000020.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.346376195.0000000000815000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fn-group.info/fnsearcher/download.htmlw
              Source: file.exe, 00000000.00000003.347773502.00000000021C0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.250490694.00000000021C1000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251984991.0000000002256000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000002.347088234.0000000002254000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.fn-group.info/fnsearcher/help.html
              Source: file.exe, 00000000.00000003.250397670.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251914619.0000000003190000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.fn-group.info/fnsearcher/help.html1
              Source: file.exe, 00000000.00000003.347773502.00000000021C0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.250490694.00000000021C1000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251984991.0000000002256000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000002.347088234.0000000002254000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.fn-group.info/fnsearcher/help.htmlB
              Source: is-SQE6E.tmp, is-SQE6E.tmp, 00000001.00000000.251439199.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-6KAKC.tmp.1.dr, is-SQE6E.tmp.0.drString found in binary or memory: http://www.innosetup.com/
              Source: fnsearcher68.exe, 00000002.00000000.258860254.0000000001276000.00000002.00000001.01000000.00000007.sdmp, fnsearcher68.exe.1.dr, is-51KLJ.tmp.1.drString found in binary or memory: http://www.kungsoft.com
              Source: file.exe, 00000000.00000003.250397670.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.347783736.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251914619.0000000003190000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000002.346974137.0000000000815000.00000004.00000020.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.346249515.0000000000815000.00000004.00000020.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251984991.0000000002256000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000002.347088234.0000000002254000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.346376195.0000000000815000.00000004.00000020.00020000.00000000.sdmp, is-OS12U.tmp.1.drString found in binary or memory: http://www.n-group.info
              Source: file.exe, 00000000.00000003.250582680.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.250924927.00000000021D4000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, is-SQE6E.tmp, 00000001.00000000.251439199.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-6KAKC.tmp.1.dr, is-SQE6E.tmp.0.drString found in binary or memory: http://www.remobjects.com/?ps
              Source: file.exe, 00000000.00000003.250582680.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.250924927.00000000021D4000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000000.251439199.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-6KAKC.tmp.1.dr, is-SQE6E.tmp.0.drString found in binary or memory: http://www.remobjects.com/?psU
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00401B30 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,
              Source: global trafficHTTP traffic detected: GET /itsnotmalware/count.php?sub=NOSUB&stream=start&substream=mixinte HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 45.139.105.171Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 45.139.105.171Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /storage/ping.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 0Host: 107.182.129.235Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /storage/extension.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 107.182.129.235Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
              Source: is-SQE6E.tmp, 00000001.00000002.346791616.000000000079A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 2.2.fnsearcher68.exe.37d0000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.fnsearcher68.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.fnsearcher68.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.fnsearcher68.exe.37d0000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.345115638.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.343591826.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040914C AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409180 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004536F0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004081A8
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0043D2D0
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004777A8
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00461C80
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00469F50
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00458180
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00430454
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004446E8
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004348B0
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00444AF4
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0047CC54
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0045B078
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00413202
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004832E4
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0042F9F8
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00443A48
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00433BAC
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00463C84
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00404490
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_004056A0
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00406800
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00409A10
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00406AA0
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00404D40
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00405F40
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00402F20
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_0042B06A
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00422038
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_004290E9
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00415486
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_004156B8
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00422759
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00404840
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_004198C0
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00426C00
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00447D2D
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00410E00
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_0042AF4A
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00404F20
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_1000F670
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_1000EC61
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: String function: 00406A24 appears 33 times
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: String function: 00403418 appears 58 times
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: String function: 00405974 appears 97 times
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: String function: 00455538 appears 54 times
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: String function: 00445624 appears 57 times
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: String function: 004034AC appears 75 times
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: String function: 00455348 appears 90 times
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: String function: 0040788C appears 36 times
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: String function: 00445354 appears 43 times
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: String function: 00433AC4 appears 32 times
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: String function: 0040369C appears 198 times
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: String function: 00408BA4 appears 42 times
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: String function: 00451710 appears 66 times
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: String function: 10003C50 appears 34 times
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: String function: 0040FD90 appears 54 times
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0042EBCC NtdllDefWindowProc_A,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00423B68 NtdllDefWindowProc_A,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004125BC NtdllDefWindowProc_A,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00454CF8 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,
              Source: is-SQE6E.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
              Source: is-SQE6E.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
              Source: is-SQE6E.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
              Source: is-SQE6E.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
              Source: fnsearcher68.exe.1.drStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
              Source: fnsearcher68.exe.1.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
              Source: is-6KAKC.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
              Source: is-6KAKC.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
              Source: is-6KAKC.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
              Source: is-6KAKC.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
              Source: file.exe, 00000000.00000003.250582680.00000000023F0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
              Source: file.exe, 00000000.00000003.250582680.00000000023F0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename6 vs file.exe
              Source: file.exe, 00000000.00000003.250924927.00000000021D4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
              Source: file.exe, 00000000.00000003.250924927.00000000021D4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename6 vs file.exe
              Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\fnSearcher\is-6KAKC.tmp 40AE4CA142D536558D329DF560CDBE29D2335F0F7E349C26887B3AB411E0F54D
              Source: fnsearcher68.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_SYSHEAP, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: _RegDLL.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: file.exeReversingLabs: Detection: 17%
              Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
              Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp "C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp" /SL4 $30224 "C:\Users\user\Desktop\file.exe" 2630911 52736
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpProcess created: C:\Program Files (x86)\fnSearcher\fnsearcher68.exe "C:\Program Files (x86)\fnSearcher\fnsearcher68.exe"
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\0JzI2az.exe
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "fnsearcher68.exe" /f & erase "C:\Program Files (x86)\fnSearcher\fnsearcher68.exe" & exit
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "fnsearcher68.exe" /f
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp "C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp" /SL4 $30224 "C:\Users\user\Desktop\file.exe" 2630911 52736
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpProcess created: C:\Program Files (x86)\fnSearcher\fnsearcher68.exe "C:\Program Files (x86)\fnSearcher\fnsearcher68.exe"
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\0JzI2az.exe
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "fnsearcher68.exe" /f & erase "C:\Program Files (x86)\fnSearcher\fnsearcher68.exe" & exit
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "fnsearcher68.exe" /f
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040914C AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409180 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004536F0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
              Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;fnsearcher68.exe&quot;)
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4Jump to behavior
              Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmpJump to behavior
              Source: classification engineClassification label: mal96.troj.evad.winEXE@12/31@0/5
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00401B30 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00402BF0 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00405350 CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,FindCloseChangeNotification,
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3328:120:WilError_01
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004098C8 FindResourceA,SizeofResource,LoadResource,LockResource,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile created: C:\Program Files (x86)\fnSearcherJump to behavior
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCommand line argument: `a}{
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCommand line argument: MFE.
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCommand line argument: ZK]Z
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCommand line argument: ZK]Z
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganization
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwner
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpWindow found: window name: TMainForm
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: file.exeStatic file information: File size 2881497 > 1048576

              Data Obfuscation

              barindex
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeUnpacked PE file: 2.2.fnsearcher68.exe.400000.0.unpack
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeUnpacked PE file: 2.2.fnsearcher68.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R;.rfn68:EW; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406518 push 00406555h; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004040B5 push eax; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404185 push 00404391h; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404206 push 00404391h; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C218 push eax; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004042E8 push 00404391h; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404283 push 00404391h; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408C50 push 00408C83h; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407EA0 push ecx; mov dword ptr [esp], eax
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004098E4 push 00409921h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0040A023 push ds; ret
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004062C4 push ecx; mov dword ptr [esp], eax
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00430454 push ecx; mov dword ptr [esp], eax
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0047A6CC push 0047A7AAh; ret
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004106B4 push ecx; mov dword ptr [esp], edx
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00450740 push 00450773h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0041290C push 0041296Fh; ret
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004429C0 push ecx; mov dword ptr [esp], ecx
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00456D70 push 00456DB4h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0045AD70 push ecx; mov dword ptr [esp], eax
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0040D00C push ecx; mov dword ptr [esp], edx
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00405485 push eax; ret
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00405555 push 00405761h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0040F56C push ecx; mov dword ptr [esp], edx
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004055D6 push 00405761h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00405653 push 00405761h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004056B8 push 00405761h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0047BC58 push ecx; mov dword ptr [esp], ecx
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00419C0C push ecx; mov dword ptr [esp], ecx
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_004311AD push esi; ret
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_0040F86B push ecx; ret
              Source: fnsearcher68.exe.1.drStatic PE information: section name: .rfn68
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0044A890 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
              Source: initial sampleStatic PE information: section name: .text entropy: 7.239650320490324
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile created: C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_iscrypt.dllJump to dropped file
              Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile created: C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_setup64.tmpJump to dropped file
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeFile created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\0JzI2az.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile created: C:\Program Files (x86)\fnSearcher\is-6KAKC.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile created: C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_shfoldr.dllJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile created: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile created: C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_RegDLL.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile created: C:\Program Files (x86)\fnSearcher\unins000.exe (copy)Jump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00423BF0 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00423BF0 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0047A09C IsIconic,GetWindowLongA,ShowWindow,ShowWindow,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00424178 IsIconic,SetActiveWindow,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_004241C0 IsIconic,SetActiveWindow,SetFocus,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00418368 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00422840 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0041757C IsIconic,GetCapture,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00417CB2 IsIconic,SetWindowPos,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00417CB4 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0044A890 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
              Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetSystemTime,DecisionNodes
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_setup64.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpDropped PE file which has not been started: C:\Program Files (x86)\fnSearcher\is-6KAKC.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_shfoldr.dllJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_RegDLL.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpDropped PE file which has not been started: C:\Program Files (x86)\fnSearcher\unins000.exe (copy)Jump to dropped file
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: __Init_thread_footer,GetUserNameA,GetUserNameA,__Init_thread_footer,GetUserNameA,__Init_thread_footer,GetUserNameA,GetForegroundWindow,GetWindowTextA,Sleep,Sleep,GetForegroundWindow,GetWindowTextA,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040980C GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0046E2D4 FindFirstFileA,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0047694C FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00450EA4 FindFirstFileA,GetLastError,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0045E738 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00474BD0 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0045EBB4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0045D1B4 FindFirstFileA,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0048D260 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,Sleep,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_004241DD FindFirstFileExW,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_1000959D FindFirstFileExW,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile opened: C:\Users\user
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile opened: C:\Users\user\AppData
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile opened: C:\Users\user\AppData\Roaming
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_0041371B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00402BF0 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0044A890 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00402F20 SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,VirtualAlloc,VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,VirtualAlloc,
              Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: Debug
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_0044028F mov eax, dword ptr fs:[00000030h]
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_004207CF mov eax, dword ptr fs:[00000030h]
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_004429E7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_00417F5F mov eax, dword ptr fs:[00000030h]
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_100091C7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_10006CE1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_0040FB39 SetUnhandledExceptionFilter,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_0041371B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_0040F9A5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_0040EF82 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_10006180 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_100035DF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_10003AD4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "fnsearcher68.exe" /f
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "fnsearcher68.exe" /f & erase "C:\Program Files (x86)\fnSearcher\fnsearcher68.exe" & exit
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "fnsearcher68.exe" /f
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00459ACC GetVersion,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,AllocateAndInitializeSid,GetLastError,LocalFree,
              Source: fnsearcher68.exe, 00000002.00000002.345361381.00000000039DF000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: fnsearcher68.exe, 00000002.00000002.345361381.00000000039DF000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: program manager
              Source: fnsearcher68.exe, 00000002.00000002.345361381.00000000039DF000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: F.program manager
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: GetLocaleInfoA,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: GetLocaleInfoA,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: GetKeyboardLayoutList,GetLocaleInfoA,__Init_thread_footer,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: EnumSystemLocalesW,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: EnumSystemLocalesW,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: EnumSystemLocalesW,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: EnumSystemLocalesW,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: GetLocaleInfoW,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: GetLocaleInfoW,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: GetLocaleInfoW,
              Source: C:\Program Files (x86)\fnSearcher\fnsearcher68.exeCode function: 2_2_0043E835 cpuid
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_0045604C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004026C4 GetSystemTime,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405C44 GetVersionExA,
              Source: C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmpCode function: 1_2_00453688 GetUserNameA,

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 2.2.fnsearcher68.exe.37d0000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.fnsearcher68.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.fnsearcher68.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.fnsearcher68.exe.37d0000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.345115638.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.343591826.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Windows Management Instrumentation
              Path Interception1
              Access Token Manipulation
              1
              Disable or Modify Tools
              1
              Input Capture
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              Exfiltration Over Other Network Medium2
              Ingress Tool Transfer
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
              System Shutdown/Reboot
              Default Accounts3
              Native API
              Boot or Logon Initialization Scripts13
              Process Injection
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory1
              Account Discovery
              Remote Desktop Protocol1
              Input Capture
              Exfiltration Over Bluetooth2
              Encrypted Channel
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain Accounts2
              Command and Scripting Interpreter
              Logon Script (Windows)Logon Script (Windows)3
              Obfuscated Files or Information
              Security Account Manager3
              File and Directory Discovery
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)23
              Software Packing
              NTDS25
              System Information Discovery
              Distributed Component Object ModelInput CaptureScheduled Transfer11
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
              Masquerading
              LSA Secrets14
              Security Software Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common1
              Access Token Manipulation
              Cached Domain Credentials3
              Process Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items13
              Process Injection
              DCSync11
              Application Window Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem3
              System Owner/User Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 736956 Sample: file.exe Startdate: 03/11/2022 Architecture: WINDOWS Score: 96 47 45.139.105.1 CMCSUS Italy 2->47 49 85.31.46.167 CLOUDCOMPUTINGDE Germany 2->49 51 Antivirus detection for URL or domain 2->51 53 Multi AV Scanner detection for submitted file 2->53 55 Detected unpacking (changes PE section rights) 2->55 57 4 other signatures 2->57 10 file.exe 2 2->10         started        signatures3 process4 file5 31 C:\Users\user\AppData\Local\...\is-SQE6E.tmp, PE32 10->31 dropped 13 is-SQE6E.tmp 16 25 10->13         started        process6 file7 33 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->33 dropped 35 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 13->35 dropped 37 C:\...\unins000.exe (copy), PE32 13->37 dropped 39 4 other files (2 malicious) 13->39 dropped 16 fnsearcher68.exe 25 13->16         started        process8 dnsIp9 41 107.182.129.235, 49700, 80 META-ASUS Reserved 16->41 43 171.22.30.106, 49701, 80 CMCSUS Germany 16->43 45 45.139.105.171, 49699, 80 CMCSUS Italy 16->45 29 C:\Users\user\AppData\Roaming\...\0JzI2az.exe, PE32 16->29 dropped 20 0JzI2az.exe 16->20         started        23 cmd.exe 1 16->23         started        file10 process11 signatures12 59 Multi AV Scanner detection for dropped file 20->59 25 taskkill.exe 1 23->25         started        27 conhost.exe 23->27         started        process13

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              file.exe17%ReversingLabsWin32.Trojan.Generic
              SourceDetectionScannerLabelLink
              C:\Program Files (x86)\fnSearcher\fnsearcher68.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_RegDLL.tmp0%MetadefenderBrowse
              C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_iscrypt.dll2%ReversingLabs
              C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_iscrypt.dll3%MetadefenderBrowse
              C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_setup64.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_setup64.tmp0%MetadefenderBrowse
              C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_shfoldr.dll2%ReversingLabs
              C:\Users\user\AppData\Local\Temp\is-6LIA6.tmp\_isetup\_shfoldr.dll4%MetadefenderBrowse
              C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp8%ReversingLabs
              C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp3%MetadefenderBrowse
              C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\0JzI2az.exe38%ReversingLabsWin32.Trojan.Generic
              SourceDetectionScannerLabelLinkDownload
              2.2.fnsearcher68.exe.10000000.6.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
              0.3.file.exe.21d4000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              2.2.fnsearcher68.exe.400000.0.unpack100%AviraHEUR/AGEN.1250671Download File
              1.2.is-SQE6E.tmp.400000.0.unpack100%AviraTR/Dropper.GenDownload File
              0.2.file.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=start&substream=mixinte0%URL Reputationsafe
              http://www.innosetup.com/0%URL Reputationsafe
              http://www.n-group.info0%URL Reputationsafe
              http://www.n-group.info0%URL Reputationsafe
              http://45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte0%URL Reputationsafe
              http://107.182.129.235/storage/extension.php0%URL Reputationsafe
              http://www.remobjects.com/?ps0%URL Reputationsafe
              http://107.182.129.235/storage/ping.php0%URL Reputationsafe
              http://171.22.30.106/library.php100%URL Reputationmalware
              http://www.remobjects.com/?psU0%URL Reputationsafe
              http://www.fn-group.info/fnsearcher/help.html10%Avira URL Cloudsafe
              http://www.fn-group.info/-0%Avira URL Cloudsafe
              http://www.kungsoft.com0%Avira URL Cloudsafe
              http://www.fn-group.info/0%Avira URL Cloudsafe
              http://www.fn-group.info/fnsearcher/download.html0%Avira URL Cloudsafe
              http://www.fn-group.info/-http://www.fn-group.info/fnsearcher/help.html1http://www.fn-group.info/fns0%Avira URL Cloudsafe
              http://www.fn-group.info/fnsearcher/help.html0%Avira URL Cloudsafe
              http://www.fn-group.info/fnsearcher/help.htmlB0%Avira URL Cloudsafe
              http://www.fn-group.info/80%Avira URL Cloudsafe
              http://www.fn-group.info/fnsearcher/download.htmlw0%Avira URL Cloudsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=start&substream=mixintefalse
              • URL Reputation: safe
              unknown
              http://45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixintefalse
              • URL Reputation: safe
              unknown
              http://107.182.129.235/storage/extension.phpfalse
              • URL Reputation: safe
              unknown
              http://107.182.129.235/storage/ping.phpfalse
              • URL Reputation: safe
              unknown
              http://171.22.30.106/library.phptrue
              • URL Reputation: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.innosetup.com/is-SQE6E.tmp, is-SQE6E.tmp, 00000001.00000000.251439199.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-6KAKC.tmp.1.dr, is-SQE6E.tmp.0.drfalse
              • URL Reputation: safe
              unknown
              http://www.n-group.infofile.exe, 00000000.00000003.250397670.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.347783736.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251914619.0000000003190000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000002.346974137.0000000000815000.00000004.00000020.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.346249515.0000000000815000.00000004.00000020.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251984991.0000000002256000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000002.347088234.0000000002254000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.346376195.0000000000815000.00000004.00000020.00020000.00000000.sdmp, is-OS12U.tmp.1.drfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.fn-group.info/-http://www.fn-group.info/fnsearcher/help.html1http://www.fn-group.info/fnsfile.exe, 00000000.00000003.250397670.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251914619.0000000003190000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fn-group.info/fnsearcher/help.html1file.exe, 00000000.00000003.250397670.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251914619.0000000003190000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fn-group.info/fnsearcher/help.htmlfile.exe, 00000000.00000003.347773502.00000000021C0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.250490694.00000000021C1000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251984991.0000000002256000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000002.347088234.0000000002254000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fn-group.info/is-SQE6E.tmp, 00000001.00000002.347088234.0000000002254000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fn-group.info/fnsearcher/download.htmlis-SQE6E.tmp, 00000001.00000002.347088234.0000000002254000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fn-group.info/-file.exe, 00000000.00000003.250397670.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251914619.0000000003190000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.remobjects.com/?psfile.exe, 00000000.00000003.250582680.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.250924927.00000000021D4000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, is-SQE6E.tmp, 00000001.00000000.251439199.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-6KAKC.tmp.1.dr, is-SQE6E.tmp.0.drfalse
              • URL Reputation: safe
              unknown
              http://www.fn-group.info/fnsearcher/help.htmlBfile.exe, 00000000.00000003.347773502.00000000021C0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.250490694.00000000021C1000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.251984991.0000000002256000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000002.347088234.0000000002254000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.kungsoft.comfnsearcher68.exe, 00000002.00000000.258860254.0000000001276000.00000002.00000001.01000000.00000007.sdmp, fnsearcher68.exe.1.dr, is-51KLJ.tmp.1.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fn-group.info/8is-SQE6E.tmp, 00000001.00000002.346791616.000000000079A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.fn-group.info/fnsearcher/download.htmlwis-SQE6E.tmp, 00000001.00000002.346974137.0000000000815000.00000004.00000020.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.346249515.0000000000815000.00000004.00000020.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000003.346376195.0000000000815000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.remobjects.com/?psUfile.exe, 00000000.00000003.250582680.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.250924927.00000000021D4000.00000004.00001000.00020000.00000000.sdmp, is-SQE6E.tmp, 00000001.00000000.251439199.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-6KAKC.tmp.1.dr, is-SQE6E.tmp.0.drfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              45.139.105.171
              unknownItaly
              33657CMCSUSfalse
              45.139.105.1
              unknownItaly
              33657CMCSUStrue
              85.31.46.167
              unknownGermany
              43659CLOUDCOMPUTINGDEtrue
              107.182.129.235
              unknownReserved
              11070META-ASUSfalse
              171.22.30.106
              unknownGermany
              33657CMCSUSfalse
              Joe Sandbox Version:36.0.0 Rainbow Opal
              Analysis ID:736956
              Start date and time:2022-11-03 12:30:23 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 10m 59s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:file.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:18
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal96.troj.evad.winEXE@12/31@0/5
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 24.9% (good quality ratio 23.8%)
              • Quality average: 80%
              • Quality standard deviation: 26.8%
              HCA Information:
              • Successful, ratio: 97%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
              • TCP Packets have been reduced to 100
              • Excluded domains from analysis (whitelisted): fs.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report creation exceeded maximum time and may have missing disassembly code information.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              12:33:55API Interceptor1x Sleep call for process: 0JzI2az.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):356
              Entropy (8bit):4.884558011565004
              Encrypted:false
              SSDEEP:6:AySGO4KS/x4L8ThcSRFLk6XDuwOyoExvWmFuQUqvJrdt6YAhlAjyIDHAUXV4:Ayf3WPSPLkP/fEFWm/5v3t/byGgH
              MD5:461D6293779BDEF19493C351344F2B71
              SHA1:C441B7DAA5ABF8A2872D55F47585657147451C72
              SHA-256:0C2BD3D1AEB04523291BC72424C802E36C1733E0B72FA775B9DD0A4E9CADE263
              SHA-512:D41DBDF10A61CEDE90D68F1F7E351D9DA441026F7CF9C12AB6ADA017B185455DDBFED74760A3DD3D67ED10A9B1915E79F6ACFF70850B626C68CB1E2B22FC9C25
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:All checksum in MD5....completed.wav..8e46be5a4155710361181e3b67373404..history.rtf..1bfcde2b3d557cfb8b9004055d3a90f5..license_en.rtf..1ae62f00fc368364a2de668b3299d793..license_ru.rtf..fe7c9c6f6e8f720f886bcc65fa2d9b20..nsearcher.exe..c5e7acbda2f8bfa49bd9580120aac7b2..reset.bat..aaa149e55ddae6393fe099990747da94..unins.ico..b8ed55bf81883d2becf23fc020585214
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
              Category:dropped
              Size (bytes):272134
              Entropy (8bit):6.156729185977344
              Encrypted:false
              SSDEEP:6144:TNKofL3cEjxCryOOYJH+8a1anwxrcSOQmlBkO+kKo:TNNzsEjxCryOOYvbnwxrcewf+1o
              MD5:8E46BE5A4155710361181E3B67373404
              SHA1:18A19A04DD6E4BFE6731E6978F2CB295E1C52174
              SHA-256:32AB0D1DF26B0DCFE78D393A1F2534D1DAA5BABC6980017303ED925682CE19D0
              SHA-512:5497EEF00048125D67551FBF22747654D97903F0622830299792159DC8532013191FB006A832E7CE2B4383EE2EC67B7B7C1D06C25CF34EEB118D050AC89DC3B7
              Malicious:false
              Preview:RIFF.&..WAVEfmt ........D.............LIST....INFOIART.... ..ICMT....mp3cut.ru ..ICRD.... ..INAM.... ..IPRD.... ..IPRT....1.ISFT....Lavf55.22.100.data.&....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:modified
              Size (bytes):4448253
              Entropy (8bit):6.264319773505966
              Encrypted:false
              SSDEEP:49152:g6IGeIk/rF+FYh2VSb1+/zSYGxsnlHqeQKkZ7QhrzFJmhO+oCnFWDE:8Lh2kbuOYSilq7KkZ8ShO+vFYE
              MD5:3FCA96750E2F656A73FBC6A896F53209
              SHA1:34F711F2651D3FBAF639B3A595F9029F6AF7E245
              SHA-256:65B7C9068EBF98CEC8B955FC2D61D83EBDFA66FC656AB56C160FCE98F1F1B189
              SHA-512:2813F8E023D1BDDB564F25257909A0AD48C0A984761B2209CC383EC355A7E7B6476A4754549F9702EA420A8176C5A2AEC1732D29A659B12520A6026BCEA8E76B
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....cc.....................@......@.............@...........................#.................................................,....`..8............................................................................................................text............................... ..`.rdata..,8.......@..................@..A.data...`....@.......@..............@....tls.........P.......P..............@....rsrc........`.......`..............@..@.rfn68....(..@....(..@..............`...................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
              Category:dropped
              Size (bytes):44381
              Entropy (8bit):4.886111144563166
              Encrypted:false
              SSDEEP:384:zDkO4WdW2OTYn/akuhSm9eDAmWZJ6Sr82Zeo75Y3kpTBLRA6AlEayr:zDEDhSm9aHZ/6A92
              MD5:1BFCDE2B3D557CFB8B9004055D3A90F5
              SHA1:678353ADC2CACD12555EF12F5D94FC03CD07707E
              SHA-256:A8FBA72D4B1FB03EE40A9472430275499E361BBD74144D9956232EF2FDA0407A
              SHA-512:DF9FDB20B2054328431AA5F0D0014D949AF4BE3BFC0CB1E3D77BEDD4626DEEA83FDA259352765C04985087E260EB03FF7B337C1D4D54878EC210EFBEA6A36AD1
              Malicious:false
              Preview:{\rtf1\adeflang1025\ansi\ansicpg1251\uc1\adeff0\deff0\stshfdbch0\stshfloch0\stshfhich0\stshfbi0\deflang1049\deflangfe1049\themelang1049\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\f34\fbidi \froman\fcharset204\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset204\fprq2{\*\panose 020b0604030504040204}Verdana;}..{\flomajor\f31500\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fhimajor\f31502\fbidi \froman\fcharset204\fprq2{\*\panose 02040503050406030204}Cambria;}{\fbimajor\f31503\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\flominor\f31504\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbminor\f31505\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Rom
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
              Category:dropped
              Size (bytes):272134
              Entropy (8bit):6.156729185977344
              Encrypted:false
              SSDEEP:6144:TNKofL3cEjxCryOOYJH+8a1anwxrcSOQmlBkO+kKo:TNNzsEjxCryOOYvbnwxrcewf+1o
              MD5:8E46BE5A4155710361181E3B67373404
              SHA1:18A19A04DD6E4BFE6731E6978F2CB295E1C52174
              SHA-256:32AB0D1DF26B0DCFE78D393A1F2534D1DAA5BABC6980017303ED925682CE19D0
              SHA-512:5497EEF00048125D67551FBF22747654D97903F0622830299792159DC8532013191FB006A832E7CE2B4383EE2EC67B7B7C1D06C25CF34EEB118D050AC89DC3B7
              Malicious:false
              Preview:RIFF.&..WAVEfmt ........D.............LIST....INFOIART.... ..ICMT....mp3cut.ru ..ICRD.... ..INAM.... ..IPRD.... ..IPRT....1.ISFT....Lavf55.22.100.data.&....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:data
              Category:dropped
              Size (bytes):4448253
              Entropy (8bit):6.264319309636284
              Encrypted:false
              SSDEEP:49152:z6IGeIk/rF+FYh2VSb1+/zSYGxsnlHqeQKkZ7QhrzFJmhO+oCnFWDE:bLh2kbuOYSilq7KkZ8ShO+vFYE
              MD5:799061D3EB45D6E5A60FB66FBA8E305F
              SHA1:53F2740727690A4A3AF3BB1B8CB14A5CDCDDB828
              SHA-256:6FE6FA5C1C331ED9128A09B8562FEB929095D16AAC2925C2063C465BC4DE252F
              SHA-512:1BACCE17E0738A3DBBFDAD350B3D942A608E829544A3BEBA3A9D6E5E00B294B3F7666CB135EEAB91FCD5D8F4C0E3477001F1FA6D2624EDBCA02FE60801779996
              Malicious:false
              Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....cc.....................@......@.............@...........................#.................................................,....`..8............................................................................................................text............................... ..`.rdata..,8.......@..................@..A.data...`....@.......@..............@....tls.........P.......P..............@....rsrc........`.......`..............@..@.rfn68....(..@....(..@..............`...................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):683801
              Entropy (8bit):6.46625841767368
              Encrypted:false
              SSDEEP:12288:akxzRCUn4rP/37YzHXA6/YUKsGjQNw4qpRRpDWowphIxzr:RFRCUn4rP/37YzHXA6QJsoPtIpqxzr
              MD5:10529F95E0E03896C0C969F016E313AA
              SHA1:F79547E17C6EAC21781BD3EC267E39C9A8588207
              SHA-256:40AE4CA142D536558D329DF560CDBE29D2335F0F7E349C26887B3AB411E0F54D
              SHA-512:2B6A51A65735D3AF8E5D9A70A2C7CEDAB2C8920A720B71EACFDBA0ED8FAFCC6ACE7B28951B3953C4762B73B30E823A8A811744E207ACC695C70B8ABC301EF47D
              Malicious:true
              Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..........................0...................@..............................<%.......:...................................................P......................................................CODE................................ ..`DATA....`...........................@...BSS.....`................................idata..<%.......&..................@....tls.........@...........................rdata.......P......................@..P.reloc......`......................@..P.rsrc....:.......:..................@..P.............0......................@..P........................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
              Category:dropped
              Size (bytes):44381
              Entropy (8bit):4.886111144563166
              Encrypted:false
              SSDEEP:384:zDkO4WdW2OTYn/akuhSm9eDAmWZJ6Sr82Zeo75Y3kpTBLRA6AlEayr:zDEDhSm9aHZ/6A92
              MD5:1BFCDE2B3D557CFB8B9004055D3A90F5
              SHA1:678353ADC2CACD12555EF12F5D94FC03CD07707E
              SHA-256:A8FBA72D4B1FB03EE40A9472430275499E361BBD74144D9956232EF2FDA0407A
              SHA-512:DF9FDB20B2054328431AA5F0D0014D949AF4BE3BFC0CB1E3D77BEDD4626DEEA83FDA259352765C04985087E260EB03FF7B337C1D4D54878EC210EFBEA6A36AD1
              Malicious:false
              Preview:{\rtf1\adeflang1025\ansi\ansicpg1251\uc1\adeff0\deff0\stshfdbch0\stshfloch0\stshfhich0\stshfbi0\deflang1049\deflangfe1049\themelang1049\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\f34\fbidi \froman\fcharset204\fprq2{\*\panose 02040503050406030204}Cambria Math;}{\f39\fbidi \fswiss\fcharset204\fprq2{\*\panose 020b0604030504040204}Verdana;}..{\flomajor\f31500\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fhimajor\f31502\fbidi \froman\fcharset204\fprq2{\*\panose 02040503050406030204}Cambria;}{\fbimajor\f31503\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\flominor\f31504\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fdbminor\f31505\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Rom
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):20
              Entropy (8bit):3.3086949695628416
              Encrypted:false
              SSDEEP:3:IU4n:X4n
              MD5:AAA149E55DDAE6393FE099990747DA94
              SHA1:F3011A304194E8AA27E0E29E49F8F2C81EAECDBD
              SHA-256:E2C57F46196C1BA3EF69792DEDF532F2A2286BA876E5BB6091C6B173D2E7C5BB
              SHA-512:15121C5C5ECB404BE5E734BE437D744B8FCDB34DDD46D69E5F18CA23E4D74B79B605B9B41973989772432035332D24FFA310F78AF6F44F44C731D416F4A949AB
              Malicious:false
              Preview:nSearcher.exe /reset
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:MS Windows icon resource - 7 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
              Category:dropped
              Size (bytes):134921
              Entropy (8bit):6.105680271090377
              Encrypted:false
              SSDEEP:1536:blivjgxiL8DUPKKh1EQ3Zeyo0aIWeTjXV0/KwIhFvyt2M5BH2w:bV4lfptKIW6F0JIzw2M5B1
              MD5:B8ED55BF81883D2BECF23FC020585214
              SHA1:43F6DE28C98380B2FFBA0B29F381EB8408E6F691
              SHA-256:C63B20B68FABD4DF695389494235345CC95CF7E1826896EE6393F0E402B565DA
              SHA-512:E1CB9501575B4CD66AFD6C67BE2AECA1615E9C37C2B37E68A645B21BB6B2CAAE88CAF0EC8BE3513AD72896AB6A870154D17A56F71E50D51581F00C706553B10D
              Malicious:false
              Preview:......00.... ..%..v... .... ......&........ .h....6........ ......;........ .(...1...@@.... .(B..Y......... .........(...0...`..... ......%.............................................................................................................................................................................................................................................................................................<...^...x.....................}...b...A...!...................................................................................................................................X.................................................................]...................................................................................................................J...................................................................................3.......................................................................................................d......................
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):356
              Entropy (8bit):4.884558011565004
              Encrypted:false
              SSDEEP:6:AySGO4KS/x4L8ThcSRFLk6XDuwOyoExvWmFuQUqvJrdt6YAhlAjyIDHAUXV4:Ayf3WPSPLkP/fEFWm/5v3t/byGgH
              MD5:461D6293779BDEF19493C351344F2B71
              SHA1:C441B7DAA5ABF8A2872D55F47585657147451C72
              SHA-256:0C2BD3D1AEB04523291BC72424C802E36C1733E0B72FA775B9DD0A4E9CADE263
              SHA-512:D41DBDF10A61CEDE90D68F1F7E351D9DA441026F7CF9C12AB6ADA017B185455DDBFED74760A3DD3D67ED10A9B1915E79F6ACFF70850B626C68CB1E2B22FC9C25
              Malicious:false
              Preview:All checksum in MD5....completed.wav..8e46be5a4155710361181e3b67373404..history.rtf..1bfcde2b3d557cfb8b9004055d3a90f5..license_en.rtf..1ae62f00fc368364a2de668b3299d793..license_ru.rtf..fe7c9c6f6e8f720f886bcc65fa2d9b20..nsearcher.exe..c5e7acbda2f8bfa49bd9580120aac7b2..reset.bat..aaa149e55ddae6393fe099990747da94..unins.ico..b8ed55bf81883d2becf23fc020585214
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
              Category:dropped
              Size (bytes):44011
              Entropy (8bit):5.026565347530582
              Encrypted:false
              SSDEEP:384:em3cWBnPz+p/zWFHQ1QDGteo75Y3kpTBLRA6AlEayF:emsuQ1WGIZ/6A9U
              MD5:1AE62F00FC368364A2DE668B3299D793
              SHA1:E4E32C3EDC269987E39FDC0883F589CECF9604B4
              SHA-256:F9FF5B54BB1EBEECCC4104A62E32CAB4556DD75A5F76260E720485D5CC39D7E8
              SHA-512:844F4116FD8FF13B144D6D16DE695F7600283DC0B573CAAB5AE74573301B235AC234CE59D1D30BE8FB8ABBA3DFD27EDF8C53A7E0CD5320C23008B5F354377527
              Malicious:false
              Preview:{\rtf1\adeflang1025\ansi\ansicpg1251\uc1\adeff0\deff0\stshfdbch0\stshfloch0\stshfhich0\stshfbi0\deflang1049\deflangfe1049\themelang1049\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f34\fbidi \froman\fcharset1\fprq2{\*\panose 02040503050406030204}Cambria Math;}..{\f39\fbidi \fswiss\fcharset204\fprq2{\*\panose 00000000000000000000}Verdana;}{\flomajor\f31500\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fhimajor\f31502\fbidi \froman\fcharset204\fprq2{\*\panose 02040503050406030204}Cambria;}..{\fbimajor\f31503\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\flominor\f31504\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbminor\f31505\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
              Category:dropped
              Size (bytes):51922
              Entropy (8bit):4.912794307456054
              Encrypted:false
              SSDEEP:384:eA3cWBnPz+p/zWFHQ1Qp0SEW5FRLU+cB9nGog4jy6XFsa0eo75Y3kpTBLRA6AlE8:eAsuQ1IV75knFBV6ahZ/6A9r
              MD5:FE7C9C6F6E8F720F886BCC65FA2D9B20
              SHA1:2775F12A0BABDEE5CEEDB08452EF72732E49F13C
              SHA-256:B3F54F1D0C3EA747CC52BAD1B363815B9297088CACDF1398C8CFD7F8054CE2BB
              SHA-512:ABBFE43FBE4827C9CEDA8D1FDD3DB3B344E99E0CDC3512E4EF84F965F882BA5E3822A407AC1F974D1986F1CDA645A20C1D00CD16262200FE39574AEFF12F6A1A
              Malicious:false
              Preview:{\rtf1\adeflang1025\ansi\ansicpg1251\uc1\adeff0\deff0\stshfdbch0\stshfloch0\stshfhich0\stshfbi0\deflang1049\deflangfe1049\themelang1049\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f34\fbidi \froman\fcharset1\fprq2{\*\panose 02040503050406030204}Cambria Math;}..{\f39\fbidi \fswiss\fcharset204\fprq2{\*\panose 020b0604030504040204}Verdana;}{\flomajor\f31500\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fhimajor\f31502\fbidi \froman\fcharset204\fprq2{\*\panose 02040503050406030204}Cambria;}..{\fbimajor\f31503\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\flominor\f31504\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbminor\f31505\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
              Category:dropped
              Size (bytes):44011
              Entropy (8bit):5.026565347530582
              Encrypted:false
              SSDEEP:384:em3cWBnPz+p/zWFHQ1QDGteo75Y3kpTBLRA6AlEayF:emsuQ1WGIZ/6A9U
              MD5:1AE62F00FC368364A2DE668B3299D793
              SHA1:E4E32C3EDC269987E39FDC0883F589CECF9604B4
              SHA-256:F9FF5B54BB1EBEECCC4104A62E32CAB4556DD75A5F76260E720485D5CC39D7E8
              SHA-512:844F4116FD8FF13B144D6D16DE695F7600283DC0B573CAAB5AE74573301B235AC234CE59D1D30BE8FB8ABBA3DFD27EDF8C53A7E0CD5320C23008B5F354377527
              Malicious:false
              Preview:{\rtf1\adeflang1025\ansi\ansicpg1251\uc1\adeff0\deff0\stshfdbch0\stshfloch0\stshfhich0\stshfbi0\deflang1049\deflangfe1049\themelang1049\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f34\fbidi \froman\fcharset1\fprq2{\*\panose 02040503050406030204}Cambria Math;}..{\f39\fbidi \fswiss\fcharset204\fprq2{\*\panose 00000000000000000000}Verdana;}{\flomajor\f31500\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fhimajor\f31502\fbidi \froman\fcharset204\fprq2{\*\panose 02040503050406030204}Cambria;}..{\fbimajor\f31503\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\flominor\f31504\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbminor\f31505\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:Rich Text Format data, version 1, ANSI, code page 1251, default middle east language ID 1025
              Category:dropped
              Size (bytes):51922
              Entropy (8bit):4.912794307456054
              Encrypted:false
              SSDEEP:384:eA3cWBnPz+p/zWFHQ1Qp0SEW5FRLU+cB9nGog4jy6XFsa0eo75Y3kpTBLRA6AlE8:eAsuQ1IV75knFBV6ahZ/6A9r
              MD5:FE7C9C6F6E8F720F886BCC65FA2D9B20
              SHA1:2775F12A0BABDEE5CEEDB08452EF72732E49F13C
              SHA-256:B3F54F1D0C3EA747CC52BAD1B363815B9297088CACDF1398C8CFD7F8054CE2BB
              SHA-512:ABBFE43FBE4827C9CEDA8D1FDD3DB3B344E99E0CDC3512E4EF84F965F882BA5E3822A407AC1F974D1986F1CDA645A20C1D00CD16262200FE39574AEFF12F6A1A
              Malicious:false
              Preview:{\rtf1\adeflang1025\ansi\ansicpg1251\uc1\adeff0\deff0\stshfdbch0\stshfloch0\stshfhich0\stshfbi0\deflang1049\deflangfe1049\themelang1049\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f34\fbidi \froman\fcharset1\fprq2{\*\panose 02040503050406030204}Cambria Math;}..{\f39\fbidi \fswiss\fcharset204\fprq2{\*\panose 020b0604030504040204}Verdana;}{\flomajor\f31500\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fhimajor\f31502\fbidi \froman\fcharset204\fprq2{\*\panose 02040503050406030204}Cambria;}..{\fbimajor\f31503\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\flominor\f31504\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbminor\f31505\fbidi \froman\fcharset204\fprq2{\*\panose 02020603050405020304}Times New Roman
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):20
              Entropy (8bit):3.3086949695628416
              Encrypted:false
              SSDEEP:3:IU4n:X4n
              MD5:AAA149E55DDAE6393FE099990747DA94
              SHA1:F3011A304194E8AA27E0E29E49F8F2C81EAECDBD
              SHA-256:E2C57F46196C1BA3EF69792DEDF532F2A2286BA876E5BB6091C6B173D2E7C5BB
              SHA-512:15121C5C5ECB404BE5E734BE437D744B8FCDB34DDD46D69E5F18CA23E4D74B79B605B9B41973989772432035332D24FFA310F78AF6F44F44C731D416F4A949AB
              Malicious:false
              Preview:nSearcher.exe /reset
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:MS Windows icon resource - 7 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
              Category:dropped
              Size (bytes):134921
              Entropy (8bit):6.105680271090377
              Encrypted:false
              SSDEEP:1536:blivjgxiL8DUPKKh1EQ3Zeyo0aIWeTjXV0/KwIhFvyt2M5BH2w:bV4lfptKIW6F0JIzw2M5B1
              MD5:B8ED55BF81883D2BECF23FC020585214
              SHA1:43F6DE28C98380B2FFBA0B29F381EB8408E6F691
              SHA-256:C63B20B68FABD4DF695389494235345CC95CF7E1826896EE6393F0E402B565DA
              SHA-512:E1CB9501575B4CD66AFD6C67BE2AECA1615E9C37C2B37E68A645B21BB6B2CAAE88CAF0EC8BE3513AD72896AB6A870154D17A56F71E50D51581F00C706553B10D
              Malicious:false
              Preview:......00.... ..%..v... .... ......&........ .h....6........ ......;........ .(...1...@@.... .(B..Y......... .........(...0...`..... ......%.............................................................................................................................................................................................................................................................................................<...^...x.....................}...b...A...!...................................................................................................................................X.................................................................]...................................................................................................................J...................................................................................3.......................................................................................................d......................
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:InnoSetup Log FNSearcher {b264a18E-91B4-4910-9006-8bf37124b695}, version 0x2d, 3779 bytes, 367706\user, "C:\Program Files (x86)\fnSearcher"
              Category:dropped
              Size (bytes):3779
              Entropy (8bit):4.4819215691462615
              Encrypted:false
              SSDEEP:48:G1q3HlyMCLBv8lD8zpjxcm5UQoIN6hqkLVO3471IGX0ya3tF7yGl4XKBXD7fDMpp:GUKp8lD8zpHJoIohqYOIhxkNFjKH
              MD5:21BE62ED5593242273AD122E0D982DDB
              SHA1:DEADE12912AED05780AAC84A59388EC09DD1B1EF
              SHA-256:3AADFCFF0A5E22977AAE09981CDFB2EA79E33945317F7429A3043B508C23C95C
              SHA-512:E805B1A637E3AC023B3864EC65C9C46193B77B9AF53BB8C0AA9B6F24AE3AC44BC15005CB8F2679D331134E710C752528A127E83A796317BDD745EE8214BFD308
              Malicious:false
              Preview:Inno Setup Uninstall Log (b)....................................{b264a18E-91B4-4910-9006-8bf37124b695}..........................................................................................FNSearcher......................................................................................................................-...........%...............................................................................................................m.!$........]..3......A....367706.user!C:\Program Files (x86)\fnSearcher...........!./.... ..........T.IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..'...dll:kernel32.dll.CreateFileA.............#...dll:kernel32.dll.WriteFile...........!...dll:kernel32.dll.CloseHandle.......!...dll:kernel32.dll.ExitProcess.......$...dll:User32.dll.GetSystemMetri
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):683801
              Entropy (8bit):6.46625841767368
              Encrypted:false
              SSDEEP:12288:akxzRCUn4rP/37YzHXA6/YUKsGjQNw4qpRRpDWowphIxzr:RFRCUn4rP/37YzHXA6QJsoPtIpqxzr
              MD5:10529F95E0E03896C0C969F016E313AA
              SHA1:F79547E17C6EAC21781BD3EC267E39C9A8588207
              SHA-256:40AE4CA142D536558D329DF560CDBE29D2335F0F7E349C26887B3AB411E0F54D
              SHA-512:2B6A51A65735D3AF8E5D9A70A2C7CEDAB2C8920A720B71EACFDBA0ED8FAFCC6ACE7B28951B3953C4762B73B30E823A8A811744E207ACC695C70B8ABC301EF47D
              Malicious:true
              Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..........................0...................@..............................<%.......:...................................................P......................................................CODE................................ ..`DATA....`...........................@...BSS.....`................................idata..<%.......&..................@....tls.........@...........................rdata.......P......................@..P.reloc......`......................@..P.rsrc....:.......:..................@..P.............0......................@..P........................................................................................................................................
              Process:C:\Program Files (x86)\fnSearcher\fnsearcher68.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):17
              Entropy (8bit):3.1751231351134614
              Encrypted:false
              SSDEEP:3:nCmxEl:Cmc
              MD5:064DB2A4C3D31A4DC6AA2538F3FE7377
              SHA1:8F877AE1873C88076D854425221E352CA4178DFA
              SHA-256:0A3EC2C4FC062D561F0DC989C6699E06FFF850BBDA7923F14F26135EF42107C0
              SHA-512:CA94BC1338FC283C3E5C427065C29BA32C5A12170782E18AA0292722826C5CB4C3B29A5134464FFEB67A77CD85D8E15715C17A049B7AD4E2C890E97385751BEE
              Malicious:false
              Preview:UwUoooIIrwgh24uuU
              Process:C:\Program Files (x86)\fnSearcher\fnsearcher68.exe
              File Type:very short file (no magic)
              Category:dropped
              Size (bytes):1
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3:V:V
              MD5:CFCD208495D565EF66E7DFF9F98764DA
              SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
              SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
              SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
              Malicious:false
              Preview:0
              Process:C:\Program Files (x86)\fnSearcher\fnsearcher68.exe
              File Type:very short file (no magic)
              Category:dropped
              Size (bytes):1
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3:V:V
              MD5:CFCD208495D565EF66E7DFF9F98764DA
              SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
              SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
              SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
              Malicious:false
              Preview:0
              Process:C:\Program Files (x86)\fnSearcher\fnsearcher68.exe
              File Type:data
              Category:dropped
              Size (bytes):94224
              Entropy (8bit):7.998072640845361
              Encrypted:true
              SSDEEP:1536:NsbI9W6dHdtnEXOxZpPzIUcETzNtXofjmgGTeJduLLt+YBPoJTMRmNXg30:KWW6TZVz9PNtXo8M5OR0
              MD5:418619EA97671304AF80EC60F5A50B62
              SHA1:F11DCD709BDE2FC86EBBCCD66E1CE68A8A3F9CB6
              SHA-256:EB7ECE66C14849064F462DF4987D6D59073D812C44D81568429614581106E0F4
              SHA-512:F2E1AE47B5B0A5D3DD22DD6339E15FEE3D7F04EF03917AE2A7686E73E9F06FB95C8008038C018939BB9925F395D765C9690BF7874DC5E90BC2F77C1E730D3A00
              Malicious:false
              Preview:...mi...};...F".).T..'K;....O.Y0:.....3j.\.Ij.2R.P....C...q.|.2.....iR2W.F.C=MU......H6...A.....@..O.c...M.x8...L..- ..b..|.C...Z}.w...l.a.aT...br,...6w#.j.P.li.=......o.......S.{..R........5....#;....-....b+..G(.>..Q.....iN{.+y...ZC.z3sE...T..2.J...3.9U.4&..P......."wI.....@....x%>..D..'z.^....^(.....NC.[[k..........V]G..)e.....`.......K/L.Ul..F.."..8$.Ad....:i.g..0.d...[...T"l.U.M.=.0...,..,.ku.W,.....7`Q.Fi=w...u..:..Q-.R.}0...L.....n...t.nv.....z....e..I.C.....9.V.~1+[]..7...xQ........$.L..o.eQ./.b..Z......p].;i*)...#.b...%1........@...G..[......./.c.Z......G.:..n..E.i.O..o.U.B.Px....1{,a.....#k.dj..L4...}.d<......Iyy.J..f.W..,^vV.Ao.K."+OX8!F...YP...u.-..Bik.[.u...&Wt..P...m....^ ..k~.....l..o.zMV.!s..h...{.n2;z...K..?S..-...eW...c.....-V.bg..9.I..g.x.g...}.'.5..(*P...J#..:.IS..D}.v......jK9.LQF...oOhV...).h.v^-..F...<.....Vh.1....!...!...BYc..C?..D2.....2.K(..6....B....D..ay..=|....'....[1.~.YB:./...A`...=..F..K...........
              Process:C:\Program Files (x86)\fnSearcher\fnsearcher68.exe
              File Type:very short file (no magic)
              Category:dropped
              Size (bytes):1
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3:V:V
              MD5:CFCD208495D565EF66E7DFF9F98764DA
              SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
              SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
              SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
              Malicious:false
              Preview:0
              Process:C:\Program Files (x86)\fnSearcher\fnsearcher68.exe
              File Type:very short file (no magic)
              Category:dropped
              Size (bytes):1
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3:V:V
              MD5:CFCD208495D565EF66E7DFF9F98764DA
              SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
              SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
              SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
              Malicious:false
              Preview:0
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):3584
              Entropy (8bit):4.012434743866195
              Encrypted:false
              SSDEEP:48:iAnz1hEU3FR/pmqBl8/QMCBaquEMx5BCwSS4k+bkguj0K:pz1eEFNcqBC/Qrex5MSKD
              MD5:C594B792B9C556EA62A30DE541D2FB03
              SHA1:69E0207515E913243B94C2D3A116D232FF79AF5F
              SHA-256:5DCC1E0A197922907BCA2C4369F778BD07EE4B1BBBDF633E987A028A314D548E
              SHA-512:387BD07857B0DE67C04E0ABF89B754691683F30515726045FF382DA9B6B7F36570E38FAE9ECA5C4F0110CE9BB421D8045A5EC273C4C47B5831948564763ED144
              Malicious:false
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              • Antivirus: Metadefender, Detection: 0%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L.....%E..................................... ....@..........................@..............................................l ..P....0..8............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...8....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):2560
              Entropy (8bit):2.8818118453929262
              Encrypted:false
              SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
              MD5:A69559718AB506675E907FE49DEB71E9
              SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
              SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
              SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 2%
              • Antivirus: Metadefender, Detection: 3%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:PE32+ executable (console) x86-64, for MS Windows
              Category:dropped
              Size (bytes):5632
              Entropy (8bit):4.203889009972449
              Encrypted:false
              SSDEEP:48:SvTmfWvPcXegCWUo1vlZwrAxoONfHFZONfH3d1xCWMBgW2p3SS4k+bkg6j0K:nfkcXegjJ/ZgYNzcld1xamW2pCSKv
              MD5:B4604F8CD050D7933012AE4AA98E1796
              SHA1:36B7D966C7F87860CD6C46096B397AA23933DF8E
              SHA-256:B50B7AC03EC6DA865BF4504C7AC1E52D9F5B67C7BCB3EC0DB59FAB24F1B471C5
              SHA-512:3057AA4810245DA0B340E1C70201E5CE528CFDC5A164915E7B11855E3A5B9BA0ED77FBC542F5E4EB296EA65AF88F263647B577151068636BA188D8C4FD44E431
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              • Antivirus: Metadefender, Detection: 0%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d......E..........#............................@.............................`..............................................................<!.......P..8....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...8....P......................@..@................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
              Category:dropped
              Size (bytes):23312
              Entropy (8bit):4.596242908851566
              Encrypted:false
              SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
              MD5:92DC6EF532FBB4A5C3201469A5B5EB63
              SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
              SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
              SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
              Malicious:false
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 2%
              • Antivirus: Metadefender, Detection: 4%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\file.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):673280
              Entropy (8bit):6.456966952098253
              Encrypted:false
              SSDEEP:12288:CkxzRCUn4rP/37YzHXA6/YUKsGjQNw4qpRRpDWowphIxz:ZFRCUn4rP/37YzHXA6QJsoPtIpqxz
              MD5:7CD12C54A9751CA6EEE6AB0C85FB68F5
              SHA1:76562E9B7888B6D20D67ADDB5A90B68B54A51987
              SHA-256:E82CABB027DB8846C3430BE760F137AFA164C36F9E1B93A6E34C96DE0B2C5A5F
              SHA-512:27BA5D2F719AAAC2EAD6FB42F23AF3AA866F75026BE897CD2F561F3E383904E89E6043BD22B4AE24F69787BD258A68FF696C09C03D656CBF7C79C2A52D8D82CC
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 8%
              • Antivirus: Metadefender, Detection: 3%, Browse
              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..........................0...................@..............................<%.......:...................................................P......................................................CODE................................ ..`DATA....`...........................@...BSS.....`................................idata..<%.......&..................@....tls.........@...........................rdata.......P......................@..P.reloc......`......................@..P.rsrc....:.......:..................@..P.............0......................@..P........................................................................................................................................
              Process:C:\Program Files (x86)\fnSearcher\fnsearcher68.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):73728
              Entropy (8bit):6.20389308045717
              Encrypted:false
              SSDEEP:1536:bvUpDLxyxA14o3/M238r6+XfHAgbqmE8MpKdwuasZLUM7DsWlXcdyZgfmi:WDLZKa/MtXfHAgbqmEtxsfmyZgfmi
              MD5:3FB36CB0B7172E5298D2992D42984D06
              SHA1:439827777DF4A337CBB9FA4A4640D0D3FA1738B7
              SHA-256:27AE813CEFF8AA56E9FA68C8E50BB1C6C4A01636015EAC4BD8BF444AFB7020D6
              SHA-512:6B39CB32D77200209A25080AC92BC71B1F468E2946B651023793F3585EE6034ADC70924DBD751CF4A51B5E71377854F1AB43C2DD287D4837E7B544FF886F470C
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 38%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................................................................9...........Rich............................PE..L....,?c.....................~......_.............@..........................`............@.....................................(....@.......................P..........8...............................@............................................text............................... ..`.rdata..dY.......Z..................@..@.data........ ......................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.997057951465239
              TrID:
              • Win32 Executable (generic) a (10002005/4) 97.43%
              • Win32 Executable PowerBASIC/Win 9.x (148305/79) 1.44%
              • Inno Setup installer (109748/4) 1.07%
              • Win16/32 Executable Delphi generic (2074/23) 0.02%
              • Generic Win/DOS Executable (2004/3) 0.02%
              File name:file.exe
              File size:2881497
              MD5:9156fa044ec274f670095e43e205d137
              SHA1:62107d1bd3cb01d59924433f1c8a97c7096d5fb7
              SHA256:861751b8c762f3332f12c1f4ff45c3108357b1debbde2a07a5e9d44e806ce88d
              SHA512:5bbf3a2d3050cf7994e07cb0b6c5fd5605c095cf7ca2e0d46c5434a248a47f3f2dcf506a63d93efc97d7ce0f8aae8efb21f253cb1a5745da291765295ad0ad9e
              SSDEEP:49152:Z2cj4MkOZSuwjh/SfJe0jMgewii3AY6YlqQB14ZohSzyx60KS1UX/EqA5hq:Mc5kOnwjh/SfJe0Ygew+Yt8i14ahGB0I
              TLSH:F5D53372B5A1923AC7900B796CBEE72AFC337D3D112D9A54B6AC530D9C1308B914CB97
              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
              Icon Hash:a2a0b496b2caca72
              Entrypoint:0x40991c
              Entrypoint Section:CODE
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              DLL Characteristics:TERMINAL_SERVER_AWARE
              Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:1
              OS Version Minor:0
              File Version Major:1
              File Version Minor:0
              Subsystem Version Major:1
              Subsystem Version Minor:0
              Import Hash:884310b1928934402ea6fec1dbd3cf5e
              Instruction
              push ebp
              mov ebp, esp
              add esp, FFFFFFCCh
              push ebx
              push esi
              push edi
              xor eax, eax
              mov dword ptr [ebp-10h], eax
              mov dword ptr [ebp-24h], eax
              call 00007FBBA8AC4AFFh
              call 00007FBBA8AC5D06h
              call 00007FBBA8AC7F31h
              call 00007FBBA8AC7FB8h
              call 00007FBBA8ACA65Fh
              call 00007FBBA8ACA7C6h
              xor eax, eax
              push ebp
              push 00409FC6h
              push dword ptr fs:[eax]
              mov dword ptr fs:[eax], esp
              xor edx, edx
              push ebp
              push 00409F7Ch
              push dword ptr fs:[edx]
              mov dword ptr fs:[edx], esp
              mov eax, dword ptr [0040C014h]
              call 00007FBBA8ACB1F0h
              call 00007FBBA8ACAD7Bh
              lea edx, dword ptr [ebp-10h]
              xor eax, eax
              call 00007FBBA8AC8435h
              mov edx, dword ptr [ebp-10h]
              mov eax, 0040CDD4h
              call 00007FBBA8AC4BB0h
              push 00000002h
              push 00000000h
              push 00000001h
              mov ecx, dword ptr [0040CDD4h]
              mov dl, 01h
              mov eax, 0040719Ch
              call 00007FBBA8AC8CA0h
              mov dword ptr [0040CDD8h], eax
              xor edx, edx
              push ebp
              push 00409F5Ah
              push dword ptr fs:[edx]
              mov dword ptr fs:[edx], esp
              call 00007FBBA8ACB260h
              mov dword ptr [0040CDE0h], eax
              mov eax, dword ptr [0040CDE0h]
              cmp dword ptr [eax+0Ch], 01h
              jne 00007FBBA8ACB39Ah
              mov eax, dword ptr [0040CDE0h]
              mov edx, 00000028h
              call 00007FBBA8AC90A1h
              mov edx, dword ptr [0040CDE0h]
              cmp eax, dword ptr [edx+00h]
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2800.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              CODE0x10000x90400x9200False0.610980308219178data6.5386448278888665IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              DATA0xb0000x2480x400False0.3046875data2.711035285634283IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              BSS0xc0000xe340x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .idata0xd0000x9500xa00False0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .tls0xe0000x80x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rdata0xf0000x180x200False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
              .reloc0x100000x8a40x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
              .rsrc0x110000x28000x2800False0.332421875data4.465850706524941IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands
              RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands
              RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands
              RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands
              RT_STRING0x125740x2f2data
              RT_STRING0x128680x30cdata
              RT_STRING0x12b740x2cedata
              RT_STRING0x12e440x68data
              RT_STRING0x12eac0xb4data
              RT_STRING0x12f600xaedata
              RT_RCDATA0x130100x2cdata
              RT_GROUP_ICON0x1303c0x3edataEnglishUnited States
              RT_VERSION0x1307c0x3ccdataEnglishUnited States
              RT_MANIFEST0x134480x383XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
              DLLImport
              kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
              user32.dllMessageBoxA
              oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
              kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
              user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
              comctl32.dllInitCommonControls
              advapi32.dllAdjustTokenPrivileges
              Language of compilation systemCountry where language is spokenMap
              DutchNetherlands
              EnglishUnited States
              TimestampSource PortDest PortSource IPDest IP
              Nov 3, 2022 12:33:53.535412073 CET4969980192.168.2.345.139.105.171
              Nov 3, 2022 12:33:53.562572956 CET804969945.139.105.171192.168.2.3
              Nov 3, 2022 12:33:53.562913895 CET4969980192.168.2.345.139.105.171
              Nov 3, 2022 12:33:53.563388109 CET4969980192.168.2.345.139.105.171
              Nov 3, 2022 12:33:53.590500116 CET804969945.139.105.171192.168.2.3
              Nov 3, 2022 12:33:55.095246077 CET804969945.139.105.171192.168.2.3
              Nov 3, 2022 12:33:55.095343113 CET4969980192.168.2.345.139.105.171
              Nov 3, 2022 12:33:55.523766994 CET4969980192.168.2.345.139.105.171
              Nov 3, 2022 12:33:55.551086903 CET804969945.139.105.171192.168.2.3
              Nov 3, 2022 12:33:57.073425055 CET804969945.139.105.171192.168.2.3
              Nov 3, 2022 12:33:57.073540926 CET4969980192.168.2.345.139.105.171
              Nov 3, 2022 12:33:57.121674061 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.149096012 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.149339914 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.150227070 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.178580046 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.179069996 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.179179907 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.207458019 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.234786034 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.235316992 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.235409021 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.235416889 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.235436916 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.235454082 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.235461950 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.235471010 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.235479116 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.235487938 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.235501051 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.235503912 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.235519886 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.235526085 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.235536098 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.235552073 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.235574007 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.235599995 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.262746096 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.262777090 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.262794018 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.262810946 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.262826920 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.262842894 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.262859106 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.262885094 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.262904882 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.262922049 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.262938023 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.262949944 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.262955904 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.262973070 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.262989044 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.263000011 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.263005018 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.263022900 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.263031960 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.263045073 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.263052940 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.263067961 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.263088942 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.263089895 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.263113022 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.263118982 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.263150930 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.290268898 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290293932 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290309906 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290326118 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290342093 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290359974 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290375948 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290393114 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290409088 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290410042 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.290425062 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290440083 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290446043 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.290456057 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290469885 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.290472031 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290487051 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290498972 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.290503025 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290518999 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290522099 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.290534973 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290539980 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.290551901 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290565968 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.290568113 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290585041 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290592909 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.290600061 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290615082 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290621042 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.290632010 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290648937 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290652037 CET4970080192.168.2.3107.182.129.235
              Nov 3, 2022 12:33:57.290664911 CET8049700107.182.129.235192.168.2.3
              Nov 3, 2022 12:33:57.290679932 CET4970080192.168.2.3107.182.129.235
              • 45.139.105.171
              • 107.182.129.235
              • 171.22.30.106

              Click to jump to process

              Target ID:0
              Start time:12:33:45
              Start date:03/11/2022
              Path:C:\Users\user\Desktop\file.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\file.exe
              Imagebase:0x400000
              File size:2881497 bytes
              MD5 hash:9156FA044EC274F670095E43E205D137
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              Target ID:1
              Start time:12:33:46
              Start date:03/11/2022
              Path:C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\AppData\Local\Temp\is-VVS8D.tmp\is-SQE6E.tmp" /SL4 $30224 "C:\Users\user\Desktop\file.exe" 2630911 52736
              Imagebase:0x400000
              File size:673280 bytes
              MD5 hash:7CD12C54A9751CA6EEE6AB0C85FB68F5
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Antivirus matches:
              • Detection: 8%, ReversingLabs
              • Detection: 3%, Metadefender, Browse
              Reputation:moderate

              Target ID:2
              Start time:12:33:49
              Start date:03/11/2022
              Path:C:\Program Files (x86)\fnSearcher\fnsearcher68.exe
              Wow64 process (32bit):true
              Commandline:"C:\Program Files (x86)\fnSearcher\fnsearcher68.exe"
              Imagebase:0x400000
              File size:4448253 bytes
              MD5 hash:3FCA96750E2F656A73FBC6A896F53209
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000002.00000002.345115638.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000002.00000002.343591826.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              Reputation:low

              Target ID:3
              Start time:12:33:55
              Start date:03/11/2022
              Path:C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\0JzI2az.exe
              Wow64 process (32bit):true
              Commandline:
              Imagebase:0xa10000
              File size:73728 bytes
              MD5 hash:3FB36CB0B7172E5298D2992D42984D06
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Antivirus matches:
              • Detection: 38%, ReversingLabs
              Reputation:moderate

              Target ID:13
              Start time:12:34:29
              Start date:03/11/2022
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:"C:\Windows\System32\cmd.exe" /c taskkill /im "fnsearcher68.exe" /f & erase "C:\Program Files (x86)\fnSearcher\fnsearcher68.exe" & exit
              Imagebase:0xb0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:14
              Start time:12:34:29
              Start date:03/11/2022
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff745070000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:15
              Start time:12:34:29
              Start date:03/11/2022
              Path:C:\Windows\SysWOW64\taskkill.exe
              Wow64 process (32bit):true
              Commandline:taskkill /im "fnsearcher68.exe" /f
              Imagebase:0x1070000
              File size:74752 bytes
              MD5 hash:15E2E0ACD891510C6268CB8899F2A1A1
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              No disassembly