Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:753425
MD5:2ed741014b8cdafd91a740432a3cffa1
SHA1:3d65ac9a3d0950a55d4c7e4cb5a6fbfeab180cab
SHA256:fc33189d3c146375f5742bbb0e82277e2b8ed3789d8feae27939e834b07ee8dc
Tags:exe
Infos:

Detection

Nymaim
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (overwrites its own PE header)
Yara detected Nymaim
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops PE files
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Uses taskkill to terminate processes
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to detect sandboxes (foreground window change detection)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 6084 cmdline: C:\Users\user\Desktop\file.exe MD5: 2ED741014B8CDAFD91A740432A3CFFA1)
    • is-QPTG8.tmp (PID: 6080 cmdline: "C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp" /SL4 $40228 "C:\Users\user\Desktop\file.exe" 1252960 51712 MD5: 85B94E72C3F2D2B5464E2AAF3C9E242A)
      • PrintFolders.exe (PID: 4532 cmdline: "C:\Program Files (x86)\PrintFolders\PrintFolders.exe" MD5: 2ABBE052537A4C836AFE8DBAC888F131)
        • uywwtiNQ.exe (PID: 6120 cmdline: MD5: 3FB36CB0B7172E5298D2992D42984D06)
        • cmd.exe (PID: 1336 cmdline: "C:\Windows\System32\cmd.exe" /c taskkill /im "PrintFolders.exe" /f & erase "C:\Program Files (x86)\PrintFolders\PrintFolders.exe" & exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 1760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • taskkill.exe (PID: 3416 cmdline: taskkill /im "PrintFolders.exe" /f MD5: 15E2E0ACD891510C6268CB8899F2A1A1)
  • cleanup
{"C2 addresses": ["45.139.105.1", "85.31.46.167", "107.182.129.235", "171.22.30.106"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.325696039.0000000001660000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
    00000002.00000002.326103420.00000000033A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
      00000002.00000002.325006522.0000000000400000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
        SourceRuleDescriptionAuthorStrings
        2.2.PrintFolders.exe.400000.1.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
          2.2.PrintFolders.exe.400000.1.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
            2.2.PrintFolders.exe.33a0000.3.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
              2.2.PrintFolders.exe.33a0000.3.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://171.22.30.106/library.phpURL Reputation: Label: malware
                Source: http://171.22.30.106/library.phpXZAvira URL Cloud: Label: malware
                Source: http://171.22.30.106/library.phpBZAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\uywwtiNQ.exeReversingLabs: Detection: 46%
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeJoe Sandbox ML: detected
                Source: 2.2.PrintFolders.exe.10000000.6.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                Source: 0.3.file.exe.20b8000.6.unpackAvira: Label: TR/Patched.Ren.Gen
                Source: 2.2.PrintFolders.exe.400000.1.unpackMalware Configuration Extractor: Nymaim {"C2 addresses": ["45.139.105.1", "85.31.46.167", "107.182.129.235", "171.22.30.106"]}
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_10001000 ISCryptGetVersion,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_10001130 ArcFourCrypt,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00403770 CryptAcquireContextW,CryptCreateHash,_mbstowcs,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,___std_exception_copy,

                Compliance

                barindex
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeUnpacked PE file: 2.2.PrintFolders.exe.400000.1.unpack
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                Source: Binary string: E:\DATA\Codework\PrintFolders\source\Release\Russian.pdb source: is-2632S.tmp.1.dr
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0046C770 FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00474708 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00451554 FindFirstFileA,GetLastError,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0048A778 FindFirstFileA,6D2B69D0,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004729D4 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0045CA54 FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00406FEC FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0045DB60 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0045DEF4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00423E2D FindFirstFileExW,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_1000959D FindFirstFileExW,
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp

                Networking

                barindex
                Source: Malware configuration extractorIPs: 45.139.105.1
                Source: Malware configuration extractorIPs: 85.31.46.167
                Source: Malware configuration extractorIPs: 107.182.129.235
                Source: Malware configuration extractorIPs: 171.22.30.106
                Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
                Source: Joe Sandbox ViewIP Address: 45.139.105.171 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 45.139.105.171
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: unknownTCP traffic detected without corresponding DNS query: 107.182.129.235
                Source: PrintFolders.exe, 00000002.00000002.325958183.0000000001773000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.182.129.235/storage/extension.php
                Source: PrintFolders.exe, 00000002.00000002.325958183.0000000001773000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.182.129.235/storage/extension.phpum
                Source: PrintFolders.exe, 00000002.00000002.325942100.0000000001762000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.182.129.235/storage/ping.php
                Source: PrintFolders.exe, 00000002.00000002.325942100.0000000001762000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://171.22.30.106/library.phpBZ
                Source: PrintFolders.exe, 00000002.00000002.325942100.0000000001762000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://171.22.30.106/library.phpXZ
                Source: file.exe, 00000000.00000003.239393272.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, is-QPTG8.tmp, 00000001.00000003.240607544.0000000002750000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://pfolders.atopoint.com
                Source: file.exe, 00000000.00000003.327202532.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.239393272.00000000020B1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://pfolders.atopoint.com.
                Source: file.exe, 00000000.00000003.239322832.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.327202532.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.239393272.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, is-QPTG8.tmp, 00000001.00000003.240607544.0000000002750000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.atopoint.com
                Source: file.exe, 00000000.00000003.327202532.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.239393272.00000000020B1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.atopoint.com.
                Source: file.exeString found in binary or memory: http://www.innosetup.com
                Source: is-QPTG8.tmp, is-QPTG8.tmp, 00000001.00000000.240048151.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-48N1K.tmp.1.dr, is-QPTG8.tmp.0.drString found in binary or memory: http://www.innosetup.com/
                Source: file.exe, 00000000.00000003.239484290.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.239653432.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, is-QPTG8.tmp, 00000001.00000002.326821048.00000000004BC000.00000002.00000001.01000000.00000004.sdmp, is-48N1K.tmp.1.dr, is-QPTG8.tmp.0.drString found in binary or memory: http://www.innosetup.comDVarFileInfo$
                Source: file.exe, 00000000.00000003.239484290.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.239653432.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, is-QPTG8.tmp, is-QPTG8.tmp, 00000001.00000000.240048151.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-48N1K.tmp.1.dr, is-QPTG8.tmp.0.drString found in binary or memory: http://www.remobjects.com/?ps
                Source: file.exe, 00000000.00000003.239484290.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.239653432.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, is-QPTG8.tmp, 00000001.00000000.240048151.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-48N1K.tmp.1.dr, is-QPTG8.tmp.0.drString found in binary or memory: http://www.remobjects.com/?psU
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00401B30 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,
                Source: global trafficHTTP traffic detected: GET /itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 45.139.105.171Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /storage/ping.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 0Host: 107.182.129.235Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /storage/extension.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 1Host: 107.182.129.235Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /library.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: 2Host: 171.22.30.106Connection: Keep-AliveCache-Control: no-cache
                Source: file.exe, 00000000.00000002.327400312.0000000000708000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.PrintFolders.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.PrintFolders.exe.400000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.PrintFolders.exe.33a0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.PrintFolders.exe.33a0000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.325696039.0000000001660000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.326103420.00000000033A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.325006522.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004081C8
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00468940
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00460F30
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0043DF70
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004303A4
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0047A6D8
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004446E8
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00434994
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0045AA90
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00480BDC
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00444C90
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00462F38
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00445388
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00435698
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00445794
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0042F948
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00457BB4
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00404490
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_004096F0
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_004056A0
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00406800
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00406AA0
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00404D40
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00405F40
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00402F20
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_004150D3
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00415305
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_004223A9
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00419510
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00404840
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00426850
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00410A50
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_0042AB9A
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00421C88
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_0042ACBA
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00447D2D
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00428D39
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00404F20
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_1000F670
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_1000EC61
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: String function: 10003C50 appears 34 times
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: String function: 0040F9E0 appears 54 times
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: String function: 004035DC appears 90 times
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: String function: 00403548 appears 62 times
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: String function: 00407B08 appears 33 times
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: String function: 00445FF4 appears 43 times
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: String function: 00455A04 appears 49 times
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: String function: 004037CC appears 193 times
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: String function: 00405AA4 appears 92 times
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: String function: 00455814 appears 86 times
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: String function: 004462C4 appears 58 times
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: String function: 004348AC appears 32 times
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: String function: 00451AFC appears 62 times
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: String function: 00408DF0 appears 42 times
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00423D9C NtdllDefWindowProc_A,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004127F0 NtdllDefWindowProc_A,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004551C4 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,
                Source: is-QPTG8.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                Source: is-QPTG8.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
                Source: is-QPTG8.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                Source: is-48N1K.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                Source: is-48N1K.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
                Source: is-48N1K.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                Source: is-2632S.tmp.1.drStatic PE information: No import functions for PE file found
                Source: file.exe, 00000000.00000002.327340443.0000000000410000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename" vs file.exe
                Source: file.exe, 00000000.00000003.239484290.00000000021A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
                Source: file.exe, 00000000.00000003.239484290.00000000021A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename6 vs file.exe
                Source: file.exe, 00000000.00000003.239653432.00000000020B8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
                Source: file.exe, 00000000.00000003.239653432.00000000020B8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename6 vs file.exe
                Source: file.exeBinary or memory string: OriginalFilename" vs file.exe
                Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\PrintFolders\Russian.dll (copy) A960C9DCD1D5C7B79F4FDD38D6F25299F4F7925555E381EA4AB6217681482F62
                Source: PrintFolders.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_SYSHEAP, IMAGE_SCN_MEM_LOCKED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp "C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp" /SL4 $40228 "C:\Users\user\Desktop\file.exe" 1252960 51712
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess created: C:\Program Files (x86)\PrintFolders\PrintFolders.exe "C:\Program Files (x86)\PrintFolders\PrintFolders.exe"
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeProcess created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\uywwtiNQ.exe
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "PrintFolders.exe" /f & erase "C:\Program Files (x86)\PrintFolders\PrintFolders.exe" & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "PrintFolders.exe" /f
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp "C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp" /SL4 $40228 "C:\Users\user\Desktop\file.exe" 1252960 51712
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess created: C:\Program Files (x86)\PrintFolders\PrintFolders.exe "C:\Program Files (x86)\PrintFolders\PrintFolders.exe"
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeProcess created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\uywwtiNQ.exe
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "PrintFolders.exe" /f & erase "C:\Program Files (x86)\PrintFolders\PrintFolders.exe" & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "PrintFolders.exe" /f
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408F74 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,6D744E70,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00453A8C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,6D744E70,
                Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;PrintFolders.exe&quot;)
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeFile created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}Jump to behavior
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmpJump to behavior
                Source: classification engineClassification label: mal88.troj.evad.winEXE@12/23@0/5
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00401B30 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00454498 GetModuleHandleA,6D2B5550,GetDiskFreeSpaceA,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00402BF0 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00405350 CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,FindCloseChangeNotification,
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1760:120:WilError_01
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0040B1E0 FindResourceA,FreeResource,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpFile created: C:\Program Files (x86)\PrintFoldersJump to behavior
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCommand line argument: `a}{
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCommand line argument: MFE.
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCommand line argument: ZK]Z
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCommand line argument: ZK]Z
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpWindow found: window name: TMainForm
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: file.exeStatic file information: File size 1488975 > 1048576
                Source: Binary string: E:\DATA\Codework\PrintFolders\source\Release\Russian.pdb source: is-2632S.tmp.1.dr

                Data Obfuscation

                barindex
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeUnpacked PE file: 2.2.PrintFolders.exe.400000.1.unpack
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeUnpacked PE file: 2.2.PrintFolders.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R;.rgw89:EW; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406584 push 004065C1h; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404159 push eax; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404229 push 00404435h; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407E84 push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004042AA push 00404435h; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408B24 push 00408B57h; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404327 push 00404435h; ret
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040438C push 00404435h; ret
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00409B70 push 00409BADh; ret
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0040A257 push ds; ret
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00478210 push 004782BBh; ret
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0040A22B push ds; ret
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004063C8 push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004303A4 push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0045A74C push ecx; mov dword ptr [esp], eax
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004108E8 push ecx; mov dword ptr [esp], edx
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00412B40 push 00412BA3h; ret
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00450FF8 push 0045102Bh; ret
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0040D240 push ecx; mov dword ptr [esp], edx
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004055BD push eax; ret
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00443660 push ecx; mov dword ptr [esp], ecx
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0040568D push 00405899h; ret
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00479768 push ecx; mov dword ptr [esp], ecx
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0040570E push 00405899h; ret
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004057F0 push 00405899h; ret
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0040578B push 00405899h; ret
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0040F7A0 push ecx; mov dword ptr [esp], edx
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00419E40 push ecx; mov dword ptr [esp], ecx
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_004311AD push esi; ret
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_0040F4BB push ecx; ret
                Source: PrintFolders.exe.1.drStatic PE information: section name: .rgw89
                Source: initial sampleStatic PE information: section name: .text entropy: 7.272434889037595
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpFile created: C:\Program Files (x86)\PrintFolders\unins000.exe (copy)Jump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpFile created: C:\Program Files (x86)\PrintFolders\PrintFolders.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpFile created: C:\Program Files (x86)\PrintFolders\is-2632S.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpFile created: C:\Program Files (x86)\PrintFolders\Russian.dll (copy)Jump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpFile created: C:\Users\user\AppData\Local\Temp\is-385TG.tmp\_isetup\_setup64.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpFile created: C:\Program Files (x86)\PrintFolders\is-48N1K.tmpJump to dropped file
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeFile created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\uywwtiNQ.exeJump to dropped file
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpFile created: C:\Users\user\AppData\Local\Temp\is-385TG.tmp\_isetup\_shfoldr.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpFile created: C:\Users\user\AppData\Local\Temp\is-385TG.tmp\_iscrypt.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00423E24 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00423E24 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004243F4 IsIconic,SetActiveWindow,SetFocus,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004243AC IsIconic,SetActiveWindow,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0041859C IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00422A74 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004177B0 IsIconic,GetCapture,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00477D2C IsIconic,GetWindowLongA,ShowWindow,ShowWindow,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00417EE6 IsIconic,SetWindowPos,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00417EE8 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetSystemTime,DecisionNodes
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpDropped PE file which has not been started: C:\Program Files (x86)\PrintFolders\unins000.exe (copy)Jump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpDropped PE file which has not been started: C:\Program Files (x86)\PrintFolders\is-2632S.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpDropped PE file which has not been started: C:\Program Files (x86)\PrintFolders\Russian.dll (copy)Jump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-385TG.tmp\_isetup\_setup64.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpDropped PE file which has not been started: C:\Program Files (x86)\PrintFolders\is-48N1K.tmpJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-385TG.tmp\_isetup\_shfoldr.dllJump to dropped file
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: __Init_thread_footer,GetUserNameA,GetUserNameA,__Init_thread_footer,GetUserNameA,__Init_thread_footer,GetUserNameA,GetForegroundWindow,GetWindowTextA,Sleep,Sleep,GetForegroundWindow,GetWindowTextA,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004095D0 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0046C770 FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00474708 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00451554 FindFirstFileA,GetLastError,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0048A778 FindFirstFileA,6D2B69D0,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004729D4 FindFirstFileA,FindNextFileA,FindClose,FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0045CA54 FindFirstFileA,FindNextFileA,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00406FEC FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0045DB60 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_0045DEF4 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00423E2D FindFirstFileExW,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_1000959D FindFirstFileExW,
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\
                Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                Source: PrintFolders.exe, 00000002.00000002.325958183.0000000001773000.00000004.00000020.00020000.00000000.sdmp, PrintFolders.exe, 00000002.00000002.326024526.000000000179B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_0041336B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00402BF0 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00402F20 SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,VirtualAlloc,VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,VirtualAlloc,
                Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: Debug
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_0044028F mov eax, dword ptr fs:[00000030h]
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_0042041F mov eax, dword ptr fs:[00000030h]
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_004429E7 mov eax, dword ptr fs:[00000030h]
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_00417BAF mov eax, dword ptr fs:[00000030h]
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_100091C7 mov eax, dword ptr fs:[00000030h]
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_10006CE1 mov eax, dword ptr fs:[00000030h]
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_0040F789 SetUnhandledExceptionFilter,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_0041336B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_0040F5F5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_0040EBD2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_10006180 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_100035DF SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_10003AD4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "PrintFolders.exe" /f
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "PrintFolders.exe" /f & erase "C:\Program Files (x86)\PrintFolders\PrintFolders.exe" & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "PrintFolders.exe" /f
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_004593E4 GetVersion,GetModuleHandleA,6D2B5550,6D2B5550,6D2B5550,AllocateAndInitializeSid,LocalFree,
                Source: PrintFolders.exe, 00000002.00000002.326163828.000000000353F000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: PrintFolders.exe, 00000002.00000002.326163828.000000000353F000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: F.program manager-
                Source: PrintFolders.exe, 00000002.00000002.326163828.000000000353F000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: program manager
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,
                Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: GetLocaleInfoA,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: GetLocaleInfoA,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: GetKeyboardLayoutList,GetLocaleInfoA,__Init_thread_footer,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: EnumSystemLocalesW,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: EnumSystemLocalesW,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: EnumSystemLocalesW,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: EnumSystemLocalesW,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: GetLocaleInfoW,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: GetLocaleInfoW,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: GetLocaleInfoW,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
                Source: C:\Program Files (x86)\PrintFolders\PrintFolders.exeCode function: 2_2_0040F7F3 cpuid
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00455B2C GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,6D2B5CA0,SetNamedPipeHandleState,6D747180,CloseHandle,CloseHandle,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004026C4 GetSystemTime,
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405CB0 GetVersionExA,
                Source: C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmpCode function: 1_2_00453A24 GetUserNameA,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.PrintFolders.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.PrintFolders.exe.400000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.PrintFolders.exe.33a0000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.PrintFolders.exe.33a0000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.325696039.0000000001660000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.326103420.00000000033A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.325006522.0000000000400000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Windows Management Instrumentation
                Path Interception1
                Access Token Manipulation
                2
                Masquerading
                1
                Input Capture
                1
                System Time Discovery
                Remote Services1
                Input Capture
                Exfiltration Over Other Network Medium2
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization Scripts13
                Process Injection
                1
                Disable or Modify Tools
                LSASS Memory141
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                Exfiltration Over Bluetooth2
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts2
                Native API
                Logon Script (Windows)Logon Script (Windows)1
                Access Token Manipulation
                Security Account Manager3
                Process Discovery
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)13
                Process Injection
                NTDS11
                Application Window Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer11
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Account Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common3
                Obfuscated Files or Information
                Cached Domain Credentials1
                System Owner/User Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items23
                Software Packing
                DCSync3
                File and Directory Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem26
                System Information Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 753425 Sample: file.exe Startdate: 24/11/2022 Architecture: WINDOWS Score: 88 47 45.139.105.1 CMCSUS Italy 2->47 49 85.31.46.167 CLOUDCOMPUTINGDE Germany 2->49 51 Antivirus detection for URL or domain 2->51 53 Detected unpacking (changes PE section rights) 2->53 55 Detected unpacking (overwrites its own PE header) 2->55 57 3 other signatures 2->57 10 file.exe 2 2->10         started        signatures3 process4 file5 31 C:\Users\user\AppData\Local\...\is-QPTG8.tmp, PE32 10->31 dropped 13 is-QPTG8.tmp 17 21 10->13         started        process6 file7 33 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->33 dropped 35 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 13->35 dropped 37 C:\...\unins000.exe (copy), PE32 13->37 dropped 39 5 other files (4 malicious) 13->39 dropped 16 PrintFolders.exe 24 13->16         started        process8 dnsIp9 41 107.182.129.235, 49699, 80 META-ASUS Reserved 16->41 43 171.22.30.106, 49700, 80 CMCSUS Germany 16->43 45 45.139.105.171, 49698, 80 CMCSUS Italy 16->45 29 C:\Users\user\AppData\...\uywwtiNQ.exe, PE32 16->29 dropped 20 uywwtiNQ.exe 16->20         started        23 cmd.exe 1 16->23         started        file10 process11 signatures12 59 Multi AV Scanner detection for dropped file 20->59 25 taskkill.exe 1 23->25         started        27 conhost.exe 23->27         started        process13

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                No Antivirus matches
                SourceDetectionScannerLabelLink
                C:\Program Files (x86)\PrintFolders\PrintFolders.exe100%Joe Sandbox ML
                C:\Program Files (x86)\PrintFolders\Russian.dll (copy)0%ReversingLabs
                C:\Program Files (x86)\PrintFolders\is-2632S.tmp0%ReversingLabs
                C:\Program Files (x86)\PrintFolders\is-48N1K.tmp2%ReversingLabs
                C:\Program Files (x86)\PrintFolders\unins000.exe (copy)2%ReversingLabs
                C:\Users\user\AppData\Local\Temp\is-385TG.tmp\_iscrypt.dll2%ReversingLabs
                C:\Users\user\AppData\Local\Temp\is-385TG.tmp\_isetup\_setup64.tmp0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\is-385TG.tmp\_isetup\_shfoldr.dll2%ReversingLabs
                C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp4%ReversingLabs
                C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\uywwtiNQ.exe46%ReversingLabsWin32.Trojan.Generic
                SourceDetectionScannerLabelLinkDownload
                2.2.PrintFolders.exe.10000000.6.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
                1.2.is-QPTG8.tmp.400000.0.unpack100%AviraHEUR/AGEN.1232832Download File
                2.2.PrintFolders.exe.400000.1.unpack100%AviraHEUR/AGEN.1250671Download File
                0.2.file.exe.400000.0.unpack100%AviraHEUR/AGEN.1248792Download File
                0.3.file.exe.20b8000.6.unpack100%AviraTR/Patched.Ren.GenDownload File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.innosetup.com/0%URL Reputationsafe
                http://45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte0%URL Reputationsafe
                http://107.182.129.235/storage/extension.php0%URL Reputationsafe
                http://www.remobjects.com/?ps0%URL Reputationsafe
                http://www.innosetup.com0%URL Reputationsafe
                http://107.182.129.235/storage/ping.php0%URL Reputationsafe
                http://107.182.129.235/storage/ping.php0%URL Reputationsafe
                http://171.22.30.106/library.php100%URL Reputationmalware
                http://www.remobjects.com/?psU0%URL Reputationsafe
                http://171.22.30.106/library.phpXZ100%Avira URL Cloudmalware
                http://107.182.129.235/storage/extension.phpum0%Avira URL Cloudsafe
                http://www.atopoint.com0%VirustotalBrowse
                http://pfolders.atopoint.com.0%Avira URL Cloudsafe
                http://www.atopoint.com0%Avira URL Cloudsafe
                http://pfolders.atopoint.com0%Avira URL Cloudsafe
                http://www.atopoint.com.0%Avira URL Cloudsafe
                http://171.22.30.106/library.phpBZ100%Avira URL Cloudmalware
                http://www.innosetup.comDVarFileInfo$0%Avira URL Cloudsafe
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                http://45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixintefalse
                • URL Reputation: safe
                unknown
                http://107.182.129.235/storage/extension.phptrue
                • URL Reputation: safe
                unknown
                http://107.182.129.235/storage/ping.phptrue
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://171.22.30.106/library.phptrue
                • URL Reputation: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://pfolders.atopoint.com.file.exe, 00000000.00000003.327202532.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.239393272.00000000020B1000.00000004.00001000.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.innosetup.com/is-QPTG8.tmp, is-QPTG8.tmp, 00000001.00000000.240048151.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-48N1K.tmp.1.dr, is-QPTG8.tmp.0.drfalse
                • URL Reputation: safe
                unknown
                http://171.22.30.106/library.phpXZPrintFolders.exe, 00000002.00000002.325942100.0000000001762000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://www.atopoint.comfile.exe, 00000000.00000003.239322832.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.327202532.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.239393272.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, is-QPTG8.tmp, 00000001.00000003.240607544.0000000002750000.00000004.00001000.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.remobjects.com/?psfile.exe, 00000000.00000003.239484290.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.239653432.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, is-QPTG8.tmp, is-QPTG8.tmp, 00000001.00000000.240048151.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-48N1K.tmp.1.dr, is-QPTG8.tmp.0.drfalse
                • URL Reputation: safe
                unknown
                http://pfolders.atopoint.comfile.exe, 00000000.00000003.239393272.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, is-QPTG8.tmp, 00000001.00000003.240607544.0000000002750000.00000004.00001000.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.innosetup.comfile.exefalse
                • URL Reputation: safe
                unknown
                http://107.182.129.235/storage/extension.phpumPrintFolders.exe, 00000002.00000002.325958183.0000000001773000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.atopoint.com.file.exe, 00000000.00000003.327202532.00000000020B1000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.239393272.00000000020B1000.00000004.00001000.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://171.22.30.106/library.phpBZPrintFolders.exe, 00000002.00000002.325942100.0000000001762000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://www.innosetup.comDVarFileInfo$file.exe, 00000000.00000003.239484290.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.239653432.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, is-QPTG8.tmp, 00000001.00000002.326821048.00000000004BC000.00000002.00000001.01000000.00000004.sdmp, is-48N1K.tmp.1.dr, is-QPTG8.tmp.0.drfalse
                • Avira URL Cloud: safe
                low
                http://www.remobjects.com/?psUfile.exe, 00000000.00000003.239484290.00000000021A0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.239653432.00000000020B8000.00000004.00001000.00020000.00000000.sdmp, is-QPTG8.tmp, 00000001.00000000.240048151.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-48N1K.tmp.1.dr, is-QPTG8.tmp.0.drfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                45.139.105.171
                unknownItaly
                33657CMCSUSfalse
                45.139.105.1
                unknownItaly
                33657CMCSUStrue
                85.31.46.167
                unknownGermany
                43659CLOUDCOMPUTINGDEtrue
                107.182.129.235
                unknownReserved
                11070META-ASUStrue
                171.22.30.106
                unknownGermany
                33657CMCSUStrue
                Joe Sandbox Version:36.0.0 Rainbow Opal
                Analysis ID:753425
                Start date and time:2022-11-24 20:03:09 +01:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 7m 58s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:file.exe
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:18
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal88.troj.evad.winEXE@12/23@0/5
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 39.1% (good quality ratio 37.9%)
                • Quality average: 80.9%
                • Quality standard deviation: 24.7%
                HCA Information:
                • Successful, ratio: 96%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                • TCP Packets have been reduced to 100
                • Excluded domains from analysis (whitelisted): fs.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report creation exceeded maximum time and may have missing disassembly code information.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                20:04:06API Interceptor1x Sleep call for process: uywwtiNQ.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:MS Windows HtmlHelp Data
                Category:dropped
                Size (bytes):118869
                Entropy (8bit):7.933172616287708
                Encrypted:false
                SSDEEP:1536:a8+b7UxVIBmVQVxSHmIKruCGFkw8dctBJcIFEvSrT3eoxNjT+YL/fe3iWP7:Z+b76wV3hCb86tBJc7SffxNjqO/qiWT
                MD5:204A5BF160646F9A55ED70AB6E1A07A6
                SHA1:5404AB219FA01C270ADC36303D447109503C4A4D
                SHA-256:CACDD2C8BFA4BAE33A16A10ED609F4841AC5C4C2FE481ED0FD8CB04BC8016BBD
                SHA-512:6AAFBAF8565BF57BF4CC9E8D5EEF947E32E0D1A962C0BB619A25C35C68B7AA24599C60CB1C1B108FC9F58A1F13FF80B66E1A4DA506BE2FFD2DD05331865DAA15
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:ITSF....`..................|.{.......".....|.{......."..`...............x.......T.......................U...............ITSP....T...........................................j..].!......."..T...............PMGL................./..../#IDXHDR......./#ITBITS..../#STRINGS...>.../#SYSTEM..V.../#TOPICS....`./#URLSTR...Gw./#URLTBL....H./#WINDOWS.....D./$FIftiMain...g..8./$OBJINST...T.../author.htm...m.<./cmdline.htm...O.../ctxmenu.jpg...3..B./index.htm..'.y./interface.htm.. .^./logo.jpg...P..4./main.css...u.../PrintDir.hhc...).'./screenshot.jpg.....././shell.htm...~.Q.::DataSpace/NameList..<(::DataSpace/Storage/MSCompressed/Content..[...,::DataSpace/Storage/MSCompressed/ControlData.j.)::DataSpace/Storage/MSCompressed/SpanInfo.b./::DataSpace/Storage/MSCompressed/Transform/List.<&_::DataSpace/Storage/MSCompressed/Transform/{7FC28940-9D31-11D0-9B27-00A0C91E9C7C}/InstanceData/...i::DataSpace/Storage/MSCompressed/Transform/{7FC28940-9D31-11D0-9B27-00A0C91E9C7C}/InstanceData/ResetTable...P...........
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):5403
                Entropy (8bit):4.918324842676727
                Encrypted:false
                SSDEEP:96:uUzxQ0Bz664UbxDcqEVFUz1BDzeRGH+QanjY3ZLBxdfC4INXM/gr53F8EPeHl9j4:uU1QyZ4e9cqEfUz1BD0GH+QGjYJBxdfY
                MD5:C8B211D81EB7D4F9EBB071A117444D51
                SHA1:43BF57BB0931EBED953FE17F937C1C7FF58A027C
                SHA-256:AFD6FEA6A792B722E45A6587F70334F30051798017F4A278508C7ED3FEEA80CC
                SHA-512:C7C558EB666B570A0B03D1E8941217673677A6AF1F7CE4C43BE77D1AA859AD8DF7B212CF778B03678DD451535C7A7B02FEB65F20B744A8E9C969DF633F79A2AB
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:=====================.. History of Releases..=====================....Legend..------..[+] - added..[*] - modified..[-] - bug fixed......Version 2.51b..-------------..[-] The output file path wasn't updated in certain circumstances..[-] Added the workaround for the modal message boxes bug in Wine....Version 2.51a..-------------..[+] Focus rectangle added for the "Go!" button..[+] Added program version to the setup info..[*] A couple of interface optimizations..[-] "Check for updates" now should work under Wine....Version 2.51..------------..[+] The "Help" buttons now present in each dialog..[+] Russian user interface..[*] Improved Wine compatibility..[-] One very elusive bug inherited from the early versions finally fixed..[-] Improved the "Check for updates" behavior..[-] Fixed several regressions and smaller bugs....Version 2.5..-----------..[+] Checking for updates on startup (registered users only)..[*] Faster processing of large numbers of files..[*] Folders containing no files acc
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:RAGE Package Format (RPF),
                Category:dropped
                Size (bytes):3391
                Entropy (8bit):4.812121234949207
                Encrypted:false
                SSDEEP:96:FjjD9GrzqpptIaj6JGcnRH7aamJL4zUtWAbakj:FYrrawhbaVFtTuk
                MD5:A5E8094B0CBADE929AEE07F5DA5E9429
                SHA1:60BB56A380CD9126AC067AE39B262E28A22532CD
                SHA-256:F3AC2009C96EB3A42AFAEC7FA67D3A14E5E9E30819B543D572C9BEA790CFCAD1
                SHA-512:018D1963A0B45A731687C5811E6447911E9BC7285B25EE3BBAD95D4D9C23718EF4E9714714C8A68617EAE4F840FB3D76BC77B0C49A64346D9605CCF70592356C
                Malicious:false
                Preview:PRINTFOLDERS version 2.51b..Copyright (C) 2009-2012 Andrey Pivovarov. All rights reserved.....END USER LICENSE AGREEMENT....This license describes the conditions under which you may use version 2.51b of ..PrintFolders ("the program"). If you are unable or unwilling to accept these ..conditions in full, then, notwithstanding the conditions in the remainder of ..this license, you may not use the program at all.....The program is a full-functional software. The program never expires and may be ..used for any period of time. The program has no exclusive limitations and does ..not require registration, though you may register your copy of the program to ..support the authors and remove the nag screens.....You may copy and distribute verbatim copies of the program executable, in any ..medium, provided that you conspicuously and appropriately publish on each copy ..an appropriate copyright notice and disclaimer of warranty; keep intact all the ..notices that refer to this license and to the a
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                Category:modified
                Size (bytes):1990648
                Entropy (8bit):6.135022664098298
                Encrypted:false
                SSDEEP:49152:G0e7jkeRVgTU1Sw1pUfsWFQVNiTneoDsQ:gE2kYpUfs0QCe9Q
                MD5:2ABBE052537A4C836AFE8DBAC888F131
                SHA1:A0629A6130B7B7107681B033C0AFEE0C4EEB6CDB
                SHA-256:70717E7EE9E2A9EE5EF3804E3571B0DF6A1C2ABAF63179410A414C99705F9A47
                SHA-512:CD0361EF97CF7EB1CF248875FCBA471A2D5A9F82FA38EA15825EE60159B16465904116C1244D0CA21ED3B49895C2647653FF836B7A114FE5EC384C4E28962E0D
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....c..........'.................0.............@..........................`..............................................4........0...c...........................................................................................................text............................... ..`.rdata..n........ ..................@..@.data...@...........................@....tls......... ....... ..............@....rsrc....p...0...p...0..............@..@.rgw89..............................`...................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):21504
                Entropy (8bit):4.508743257769972
                Encrypted:false
                SSDEEP:192:kxsrC3rSQgvlS7pEeHPmIOBaVeFSiLW70ygWr:csvGmIOBa5f
                MD5:4FB606EDBDE8EFB6D34E6E1BC5F677F1
                SHA1:F8F094064D107384E619DED1139932AA38476272
                SHA-256:A960C9DCD1D5C7B79F4FDD38D6F25299F4F7925555E381EA4AB6217681482F62
                SHA-512:5B34ECB87582FFC210CA4EED06C729979D7197191CF74EB3CDB59D0F629603C171D50B6D9351DEB7DD13F6FCBBD79F8A23ED0114BBD991520CA9BFA4EF10A44D
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u.............5...............5......Rich....................PE..L....SwO...........!.........P...............................................p............@.......................................... ..`M...........................................................................................................rdata..m...........................@..@.rsrc...`M... ...N..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:RAGE Package Format (RPF),
                Category:dropped
                Size (bytes):3391
                Entropy (8bit):4.812121234949207
                Encrypted:false
                SSDEEP:96:FjjD9GrzqpptIaj6JGcnRH7aamJL4zUtWAbakj:FYrrawhbaVFtTuk
                MD5:A5E8094B0CBADE929AEE07F5DA5E9429
                SHA1:60BB56A380CD9126AC067AE39B262E28A22532CD
                SHA-256:F3AC2009C96EB3A42AFAEC7FA67D3A14E5E9E30819B543D572C9BEA790CFCAD1
                SHA-512:018D1963A0B45A731687C5811E6447911E9BC7285B25EE3BBAD95D4D9C23718EF4E9714714C8A68617EAE4F840FB3D76BC77B0C49A64346D9605CCF70592356C
                Malicious:false
                Preview:PRINTFOLDERS version 2.51b..Copyright (C) 2009-2012 Andrey Pivovarov. All rights reserved.....END USER LICENSE AGREEMENT....This license describes the conditions under which you may use version 2.51b of ..PrintFolders ("the program"). If you are unable or unwilling to accept these ..conditions in full, then, notwithstanding the conditions in the remainder of ..this license, you may not use the program at all.....The program is a full-functional software. The program never expires and may be ..used for any period of time. The program has no exclusive limitations and does ..not require registration, though you may register your copy of the program to ..support the authors and remove the nag screens.....You may copy and distribute verbatim copies of the program executable, in any ..medium, provided that you conspicuously and appropriately publish on each copy ..an appropriate copyright notice and disclaimer of warranty; keep intact all the ..notices that refer to this license and to the a
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):21504
                Entropy (8bit):4.508743257769972
                Encrypted:false
                SSDEEP:192:kxsrC3rSQgvlS7pEeHPmIOBaVeFSiLW70ygWr:csvGmIOBa5f
                MD5:4FB606EDBDE8EFB6D34E6E1BC5F677F1
                SHA1:F8F094064D107384E619DED1139932AA38476272
                SHA-256:A960C9DCD1D5C7B79F4FDD38D6F25299F4F7925555E381EA4AB6217681482F62
                SHA-512:5B34ECB87582FFC210CA4EED06C729979D7197191CF74EB3CDB59D0F629603C171D50B6D9351DEB7DD13F6FCBBD79F8A23ED0114BBD991520CA9BFA4EF10A44D
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........u.............5...............5......Rich....................PE..L....SwO...........!.........P...............................................p............@.......................................... ..`M...........................................................................................................rdata..m...........................@..@.rsrc...`M... ...N..................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):669450
                Entropy (8bit):6.478399502986981
                Encrypted:false
                SSDEEP:12288:2h5UooqWolrP837JzHvA6izJgnnyFNmayiAZrvJxOx:M5NoqWolrP837JzHvA6yknyWFxvJxOx
                MD5:CF680B53729F6E3059183D51F91D337D
                SHA1:4D6EB765BB4837F09283101490375DF5F68C8E37
                SHA-256:A3F8C832C69388A88E47DD8B612382F74D5131E8C710741EFB2410EC450BDF2D
                SHA-512:1F59A9A03485DFDB9E232F0D8B52CD864993FC25734E16DD2160190045626531685E81BDBCF0636EBA9F7CEDA9DA082A9AAD2DD4C5BFE165110731B7F89FCA51
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 2%
                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................d......t.............@..............................................@..............................$%......P+...................@...............................0......................................................CODE................................ ..`DATA................................@...BSS.....x................................idata..$%.......&..................@....tls......... ...........................rdata.......0......................@..P.reloc.......@......................@..P.rsrc...P+.......,..................@..P....................................@..P........................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):5403
                Entropy (8bit):4.918324842676727
                Encrypted:false
                SSDEEP:96:uUzxQ0Bz664UbxDcqEVFUz1BDzeRGH+QanjY3ZLBxdfC4INXM/gr53F8EPeHl9j4:uU1QyZ4e9cqEfUz1BD0GH+QGjYJBxdfY
                MD5:C8B211D81EB7D4F9EBB071A117444D51
                SHA1:43BF57BB0931EBED953FE17F937C1C7FF58A027C
                SHA-256:AFD6FEA6A792B722E45A6587F70334F30051798017F4A278508C7ED3FEEA80CC
                SHA-512:C7C558EB666B570A0B03D1E8941217673677A6AF1F7CE4C43BE77D1AA859AD8DF7B212CF778B03678DD451535C7A7B02FEB65F20B744A8E9C969DF633F79A2AB
                Malicious:false
                Preview:=====================.. History of Releases..=====================....Legend..------..[+] - added..[*] - modified..[-] - bug fixed......Version 2.51b..-------------..[-] The output file path wasn't updated in certain circumstances..[-] Added the workaround for the modal message boxes bug in Wine....Version 2.51a..-------------..[+] Focus rectangle added for the "Go!" button..[+] Added program version to the setup info..[*] A couple of interface optimizations..[-] "Check for updates" now should work under Wine....Version 2.51..------------..[+] The "Help" buttons now present in each dialog..[+] Russian user interface..[*] Improved Wine compatibility..[-] One very elusive bug inherited from the early versions finally fixed..[-] Improved the "Check for updates" behavior..[-] Fixed several regressions and smaller bugs....Version 2.5..-----------..[+] Checking for updates on startup (registered users only)..[*] Faster processing of large numbers of files..[*] Folders containing no files acc
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:MS Windows HtmlHelp Data
                Category:dropped
                Size (bytes):118869
                Entropy (8bit):7.933172616287708
                Encrypted:false
                SSDEEP:1536:a8+b7UxVIBmVQVxSHmIKruCGFkw8dctBJcIFEvSrT3eoxNjT+YL/fe3iWP7:Z+b76wV3hCb86tBJc7SffxNjqO/qiWT
                MD5:204A5BF160646F9A55ED70AB6E1A07A6
                SHA1:5404AB219FA01C270ADC36303D447109503C4A4D
                SHA-256:CACDD2C8BFA4BAE33A16A10ED609F4841AC5C4C2FE481ED0FD8CB04BC8016BBD
                SHA-512:6AAFBAF8565BF57BF4CC9E8D5EEF947E32E0D1A962C0BB619A25C35C68B7AA24599C60CB1C1B108FC9F58A1F13FF80B66E1A4DA506BE2FFD2DD05331865DAA15
                Malicious:false
                Preview:ITSF....`..................|.{.......".....|.{......."..`...............x.......T.......................U...............ITSP....T...........................................j..].!......."..T...............PMGL................./..../#IDXHDR......./#ITBITS..../#STRINGS...>.../#SYSTEM..V.../#TOPICS....`./#URLSTR...Gw./#URLTBL....H./#WINDOWS.....D./$FIftiMain...g..8./$OBJINST...T.../author.htm...m.<./cmdline.htm...O.../ctxmenu.jpg...3..B./index.htm..'.y./interface.htm.. .^./logo.jpg...P..4./main.css...u.../PrintDir.hhc...).'./screenshot.jpg.....././shell.htm...~.Q.::DataSpace/NameList..<(::DataSpace/Storage/MSCompressed/Content..[...,::DataSpace/Storage/MSCompressed/ControlData.j.)::DataSpace/Storage/MSCompressed/SpanInfo.b./::DataSpace/Storage/MSCompressed/Transform/List.<&_::DataSpace/Storage/MSCompressed/Transform/{7FC28940-9D31-11D0-9B27-00A0C91E9C7C}/InstanceData/...i::DataSpace/Storage/MSCompressed/Transform/{7FC28940-9D31-11D0-9B27-00A0C91E9C7C}/InstanceData/ResetTable...P...........
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:data
                Category:dropped
                Size (bytes):1990648
                Entropy (8bit):6.13502190347102
                Encrypted:false
                SSDEEP:49152:v0e7jkeRVgTU1Sw1pUfsWFQVNiTneoDsQ:zE2kYpUfs0QCe9Q
                MD5:DE99B1E8819F3E7BD2265CDB39050B9C
                SHA1:FC3C8DDE6D6D01983B1888C3139AD37DED4ED2FE
                SHA-256:37343E82AD7BE281C2CB98A3B97DE2E5AD31BDFEB7850E5A54F07D124B96D4D6
                SHA-512:04B99842B22DD22AFCF5399B71915D0EEF0036581050AC6DE4320AEBFE81A0EA7FD1EC9ED79D98B4FD2D4704DD006D12F1B47869DAFC51EAC10096CF328F54BC
                Malicious:false
                Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....c..........'.................0.............@..........................`..............................................4........0...c...........................................................................................................text............................... ..`.rdata..n........ ..................@..@.data...@...........................@....tls......... ....... ..............@....rsrc....p...0...p...0..............@..@.rgw89..............................`...................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:InnoSetup Log PrintFolders {73D78C7A-78F2-476F-86FF-9025EA410908}, version 0x2a, 3813 bytes, 609290\user, "C:\Program Files (x86)\PrintFolders"
                Category:dropped
                Size (bytes):3813
                Entropy (8bit):4.504029461113114
                Encrypted:false
                SSDEEP:48:weNyMHLBv8iD86plmE6FoIN0hqkLVO3471qV/LDa0zA47brL1XLk:hrp8iD86p45oIyhqYOIh0No
                MD5:5CA9A255015A4BEF13CC4C4CB36429CA
                SHA1:C26147239E8EB7D5E47FF10808E94D91DACB2C1D
                SHA-256:E6A32D3F74C0E10502BD5D726A310B9AC7D7DB52E79F87728AD30110F580CED5
                SHA-512:070DA32A80D5C79807BE4579CEB958CCD33CE07080D35EFAC817A9DC5B4BC42FD2008A12764D774AB999834968F1F9206C5094685FE889B4DEE01671837E59C4
                Malicious:false
                Preview:Inno Setup Uninstall Log (b)....................................{73D78C7A-78F2-476F-86FF-9025EA410908}}.........................................................................................PrintFolders....................................................................................................................*...........%.................................................................................................................<........y........C....609290.user#C:\Program Files (x86)\PrintFolders.................. ..........Q.IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..'...dll:kernel32.dll.CreateFileA.............#...dll:kernel32.dll.WriteFile...........!...dll:kernel32.dll.CloseHandle.......!...dll:kernel32.dll.ExitProcess.......$...dll:User32.dll.GetSystemMet
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):669450
                Entropy (8bit):6.478399502986981
                Encrypted:false
                SSDEEP:12288:2h5UooqWolrP837JzHvA6izJgnnyFNmayiAZrvJxOx:M5NoqWolrP837JzHvA6yknyWFxvJxOx
                MD5:CF680B53729F6E3059183D51F91D337D
                SHA1:4D6EB765BB4837F09283101490375DF5F68C8E37
                SHA-256:A3F8C832C69388A88E47DD8B612382F74D5131E8C710741EFB2410EC450BDF2D
                SHA-512:1F59A9A03485DFDB9E232F0D8B52CD864993FC25734E16DD2160190045626531685E81BDBCF0636EBA9F7CEDA9DA082A9AAD2DD4C5BFE165110731B7F89FCA51
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 2%
                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................d......t.............@..............................................@..............................$%......P+...................@...............................0......................................................CODE................................ ..`DATA................................@...BSS.....x................................idata..$%.......&..................@....tls......... ...........................rdata.......0......................@..P.reloc.......@......................@..P.rsrc...P+.......,..................@..P....................................@..P........................................................................................................................................
                Process:C:\Program Files (x86)\PrintFolders\PrintFolders.exe
                File Type:data
                Category:dropped
                Size (bytes):94224
                Entropy (8bit):7.998072640845361
                Encrypted:true
                SSDEEP:1536:NsbI9W6dHdtnEXOxZpPzIUcETzNtXofjmgGTeJduLLt+YBPoJTMRmNXg30:KWW6TZVz9PNtXo8M5OR0
                MD5:418619EA97671304AF80EC60F5A50B62
                SHA1:F11DCD709BDE2FC86EBBCCD66E1CE68A8A3F9CB6
                SHA-256:EB7ECE66C14849064F462DF4987D6D59073D812C44D81568429614581106E0F4
                SHA-512:F2E1AE47B5B0A5D3DD22DD6339E15FEE3D7F04EF03917AE2A7686E73E9F06FB95C8008038C018939BB9925F395D765C9690BF7874DC5E90BC2F77C1E730D3A00
                Malicious:false
                Preview:...mi...};...F".).T..'K;....O.Y0:.....3j.\.Ij.2R.P....C...q.|.2.....iR2W.F.C=MU......H6...A.....@..O.c...M.x8...L..- ..b..|.C...Z}.w...l.a.aT...br,...6w#.j.P.li.=......o.......S.{..R........5....#;....-....b+..G(.>..Q.....iN{.+y...ZC.z3sE...T..2.J...3.9U.4&..P......."wI.....@....x%>..D..'z.^....^(.....NC.[[k..........V]G..)e.....`.......K/L.Ul..F.."..8$.Ad....:i.g..0.d...[...T"l.U.M.=.0...,..,.ku.W,.....7`Q.Fi=w...u..:..Q-.R.}0...L.....n...t.nv.....z....e..I.C.....9.V.~1+[]..7...xQ........$.L..o.eQ./.b..Z......p].;i*)...#.b...%1........@...G..[......./.c.Z......G.:..n..E.i.O..o.U.B.Px....1{,a.....#k.dj..L4...}.d<......Iyy.J..f.W..,^vV.Ao.K."+OX8!F...YP...u.-..Bik.[.u...&Wt..P...m....^ ..k~.....l..o.zMV.!s..h...{.n2;z...K..?S..-...eW...c.....-V.bg..9.I..g.x.g...}.'.5..(*P...J#..:.IS..D}.v......jK9.LQF...oOhV...).h.v^-..F...<.....Vh.1....!...!...BYc..C?..D2.....2.K(..6....B....D..ay..=|....'....[1.~.YB:./...A`...=..F..K...........
                Process:C:\Program Files (x86)\PrintFolders\PrintFolders.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):17
                Entropy (8bit):3.1751231351134614
                Encrypted:false
                SSDEEP:3:nCmxEl:Cmc
                MD5:064DB2A4C3D31A4DC6AA2538F3FE7377
                SHA1:8F877AE1873C88076D854425221E352CA4178DFA
                SHA-256:0A3EC2C4FC062D561F0DC989C6699E06FFF850BBDA7923F14F26135EF42107C0
                SHA-512:CA94BC1338FC283C3E5C427065C29BA32C5A12170782E18AA0292722826C5CB4C3B29A5134464FFEB67A77CD85D8E15715C17A049B7AD4E2C890E97385751BEE
                Malicious:false
                Preview:UwUoooIIrwgh24uuU
                Process:C:\Program Files (x86)\PrintFolders\PrintFolders.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:V:V
                MD5:CFCD208495D565EF66E7DFF9F98764DA
                SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                Malicious:false
                Preview:0
                Process:C:\Program Files (x86)\PrintFolders\PrintFolders.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:V:V
                MD5:CFCD208495D565EF66E7DFF9F98764DA
                SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                Malicious:false
                Preview:0
                Process:C:\Program Files (x86)\PrintFolders\PrintFolders.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:V:V
                MD5:CFCD208495D565EF66E7DFF9F98764DA
                SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
                SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
                SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
                Malicious:false
                Preview:0
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):2560
                Entropy (8bit):2.8818118453929262
                Encrypted:false
                SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                MD5:A69559718AB506675E907FE49DEB71E9
                SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 2%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:PE32+ executable (console) x86-64, for MS Windows
                Category:dropped
                Size (bytes):4608
                Entropy (8bit):4.226829458093667
                Encrypted:false
                SSDEEP:48:6Q5EWGg69eR+Xl4SH8u09tmRJ/tE/wJI/tZ/P8sB1a:32Gel4NP9tK2/wGXhHa
                MD5:9E5BA8A0DB2AE3A955BEE397534D535D
                SHA1:EF08EF5FAC94F42C276E64765759F8BC71BF88CB
                SHA-256:08D2876741F4FD5EDFAE20054081CEF03E41C458AB1C5BBF095A288FA93627FA
                SHA-512:229A9C66080D59B7D2E1E651CFF9F00DB0CBDC08703E60D645651AF0664520CA143B088C71AD73813A500A33B48C63CA1795E2162B7620453935A4C26DB96B21
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 0%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........o4...g...g...g).zg...g...g...g.&lg...g.&yg...gRich...g........PE..d...9TTB..........#...........................@..............................P...............................................................!..x............@..H.................................................................... ...............................text............................... ..`.rdata....... ......................@..@.data...,....0......................@....pdata..H....@......................@..@................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                Category:dropped
                Size (bytes):23312
                Entropy (8bit):4.596242908851566
                Encrypted:false
                SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                Malicious:false
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 2%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\file.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):658944
                Entropy (8bit):6.468629759056718
                Encrypted:false
                SSDEEP:12288:Oh5UooqWolrP837JzHvA6izJgnnyFNmayiAZrvJxO0:05NoqWolrP837JzHvA6yknyWFxvJxO0
                MD5:85B94E72C3F2D2B5464E2AAF3C9E242A
                SHA1:CE7CCAE5F50A990D059D59292D4A332979E162BA
                SHA-256:1441464FEEEF365573AF18802C464769B7D3107624FDE24604F57E386F97F1A7
                SHA-512:C0C27189989DB482BE9BDA5B6B8B1441BDC5E9B0F3A414CCAB4C4BE516E7F99E25717845361A5B196114502FAAAF21BEC7ACA91B497ACD2E2396F49C31850880
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 4%
                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................d......t.............@..............................................@..............................$%......P+...................@...............................0......................................................CODE................................ ..`DATA................................@...BSS.....x................................idata..$%.......&..................@....tls......... ...........................rdata.......0......................@..P.reloc.......@......................@..P.rsrc...P+.......,..................@..P....................................@..P........................................................................................................................................
                Process:C:\Program Files (x86)\PrintFolders\PrintFolders.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):73728
                Entropy (8bit):6.20389308045717
                Encrypted:false
                SSDEEP:1536:bvUpDLxyxA14o3/M238r6+XfHAgbqmE8MpKdwuasZLUM7DsWlXcdyZgfmi:WDLZKa/MtXfHAgbqmEtxsfmyZgfmi
                MD5:3FB36CB0B7172E5298D2992D42984D06
                SHA1:439827777DF4A337CBB9FA4A4640D0D3FA1738B7
                SHA-256:27AE813CEFF8AA56E9FA68C8E50BB1C6C4A01636015EAC4BD8BF444AFB7020D6
                SHA-512:6B39CB32D77200209A25080AC92BC71B1F468E2946B651023793F3585EE6034ADC70924DBD751CF4A51B5E71377854F1AB43C2DD287D4837E7B544FF886F470C
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 46%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................................................................9...........Rich............................PE..L....,?c.....................~......_.............@..........................`............@.....................................(....@.......................P..........8...............................@............................................text............................... ..`.rdata..dY.......Z..................@..@.data........ ......................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................
                File type:PE32 executable (GUI) Intel 80386, for MS Windows, InnoSetup self-extracting archive
                Entropy (8bit):7.991071631974842
                TrID:
                • Win32 Executable (generic) a (10002005/4) 98.88%
                • Inno Setup installer (109748/4) 1.08%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:file.exe
                File size:1488975
                MD5:2ed741014b8cdafd91a740432a3cffa1
                SHA1:3d65ac9a3d0950a55d4c7e4cb5a6fbfeab180cab
                SHA256:fc33189d3c146375f5742bbb0e82277e2b8ed3789d8feae27939e834b07ee8dc
                SHA512:a309386146699f4cfd48872f705cce681266c63af93d9e9347a79e940a6221ce6a3606e52f7afa8a4ca91e259c31f600bad43c851eca387941b4154fe69c6d3c
                SSDEEP:24576:hizo5TdlqnGpid2DCDeCSxDQrOAE/1MA5sLspIYJj85itIqSdgZIY7eCLxYi5:KSjiQeef2E/1MDQLJjHIqDNeVi5
                TLSH:2D65330EE623297CE08340B25F7A59584766BE240D782162FAF0A4F58D7FB85690F7D3
                File Content Preview:MZP.....................@.......................Inno'....G..............!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                Icon Hash:a2a0b496b2caca72
                Entrypoint:0x40968c
                Entrypoint Section:CODE
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                DLL Characteristics:
                Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:1
                OS Version Minor:0
                File Version Major:1
                File Version Minor:0
                Subsystem Version Major:1
                Subsystem Version Minor:0
                Import Hash:da86ff6d22d7419ae7f10724a403dffd
                Instruction
                push ebp
                mov ebp, esp
                add esp, FFFFFFD4h
                push ebx
                push esi
                push edi
                xor eax, eax
                mov dword ptr [ebp-10h], eax
                mov dword ptr [ebp-1Ch], eax
                call 00007FB90D3609BFh
                call 00007FB90D361C6Ah
                call 00007FB90D363E5Dh
                call 00007FB90D363EA4h
                call 00007FB90D3663F3h
                call 00007FB90D3664E2h
                mov esi, 0040BDE0h
                xor eax, eax
                push ebp
                push 00409D71h
                push dword ptr fs:[eax]
                mov dword ptr fs:[eax], esp
                xor edx, edx
                push ebp
                push 00409D27h
                push dword ptr fs:[edx]
                mov dword ptr fs:[edx], esp
                mov eax, dword ptr [0040B014h]
                call 00007FB90D366E6Fh
                call 00007FB90D366A2Eh
                lea edx, dword ptr [ebp-10h]
                xor eax, eax
                call 00007FB90D364318h
                mov edx, dword ptr [ebp-10h]
                mov eax, 0040BDD4h
                call 00007FB90D360A6Bh
                push 00000002h
                push 00000000h
                push 00000001h
                mov ecx, dword ptr [0040BDD4h]
                mov dl, 01h
                mov eax, 004070C4h
                call 00007FB90D36497Bh
                mov dword ptr [0040BDD8h], eax
                xor edx, edx
                push ebp
                push 00409D05h
                push dword ptr fs:[edx]
                mov dword ptr fs:[edx], esp
                lea edx, dword ptr [ebp-18h]
                mov eax, dword ptr [0040BDD8h]
                call 00007FB90D364A53h
                mov ebx, dword ptr [ebp-18h]
                mov edx, 00000030h
                mov eax, dword ptr [0040BDD8h]
                call 00007FB90D364B8Dh
                mov edx, esi
                mov ecx, 0000000Ch
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0xc0000x8c8.idata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x263c.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0xf0000x0.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0xe0000x18.rdata
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                CODE0x10000x8e000x8e00False0.6218364876760564data6.600437911517656IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                DATA0xa0000x2480x400False0.3115234375data2.7204325510923035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                BSS0xb0000xe640x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .idata0xc0000x8c80xa00False0.389453125data4.2507970587946735IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .tls0xd0000x80x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rdata0xe0000x180x200False0.052734375data0.1991075177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                .reloc0xf0000x86c0x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                .rsrc0x100000x263c0x2800False0.322265625data4.568719834340923IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_ICON0x1030c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States
                RT_ICON0x104340x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States
                RT_ICON0x1099c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States
                RT_ICON0x10c840x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States
                RT_STRING0x1152c0x2f2data
                RT_STRING0x118200x30cdata
                RT_STRING0x11b2c0x2cedata
                RT_STRING0x11dfc0x68data
                RT_STRING0x11e640xb4data
                RT_STRING0x11f180xaedata
                RT_GROUP_ICON0x11fc80x3edataEnglishUnited States
                RT_VERSION0x120080x3a8dataEnglishUnited States
                RT_MANIFEST0x123b00x289XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                DLLImport
                kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                user32.dllMessageBoxA
                oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SetLastError, SetFilePointer, SetEndOfFile, RemoveDirectoryA, ReadFile, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, InterlockedExchange, FormatMessageA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                comctl32.dllInitCommonControls
                advapi32.dllAdjustTokenPrivileges
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampSource PortDest PortSource IPDest IP
                Nov 24, 2022 20:04:06.946058989 CET4969880192.168.2.345.139.105.171
                Nov 24, 2022 20:04:06.974109888 CET804969845.139.105.171192.168.2.3
                Nov 24, 2022 20:04:06.974369049 CET4969880192.168.2.345.139.105.171
                Nov 24, 2022 20:04:06.975188017 CET4969880192.168.2.345.139.105.171
                Nov 24, 2022 20:04:07.002732992 CET804969845.139.105.171192.168.2.3
                Nov 24, 2022 20:04:07.008284092 CET804969845.139.105.171192.168.2.3
                Nov 24, 2022 20:04:07.008407116 CET4969880192.168.2.345.139.105.171
                Nov 24, 2022 20:04:07.070561886 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.098324060 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.098479033 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.099627018 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.129308939 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.129746914 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.129908085 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.167032003 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.195297956 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.195595026 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.195625067 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.195647955 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.195672035 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.195697069 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.195724964 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.195734978 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.195753098 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.195776939 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.195781946 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.195808887 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.195836067 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.195873022 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.195914030 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.223795891 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.223831892 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.223859072 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.223885059 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.223911047 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.223913908 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.223938942 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.223963976 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.223965883 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.223993063 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.224016905 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.224037886 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.224055052 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.224085093 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.224133015 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.251636028 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.251678944 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.251702070 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.251724005 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.251743078 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.251748085 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.251773119 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.251797915 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.251797915 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.251797915 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.251820087 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.251822948 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.251847982 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.251859903 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.251873016 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.251887083 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.251902103 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.251909971 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.251938105 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.251966000 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.281215906 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.281248093 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.281270981 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.281295061 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.281317949 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.281327963 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.281347990 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.281378031 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.281383991 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.281383991 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.281399012 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.281409979 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.281419992 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.281443119 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.281457901 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.281459093 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.281481028 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.281492949 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.281510115 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.281532049 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.309762955 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.309798956 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.309824944 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.309849977 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.309875965 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.309887886 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.309889078 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.309889078 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.309900999 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.309926033 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.309950113 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.309973001 CET8049699107.182.129.235192.168.2.3
                Nov 24, 2022 20:04:07.309973001 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.309973001 CET4969980192.168.2.3107.182.129.235
                Nov 24, 2022 20:04:07.309973955 CET4969980192.168.2.3107.182.129.235
                • 45.139.105.171
                • 107.182.129.235
                • 171.22.30.106

                Click to jump to process

                Target ID:0
                Start time:20:03:59
                Start date:24/11/2022
                Path:C:\Users\user\Desktop\file.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\file.exe
                Imagebase:0x400000
                File size:1488975 bytes
                MD5 hash:2ED741014B8CDAFD91A740432A3CFFA1
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                Target ID:1
                Start time:20:04:00
                Start date:24/11/2022
                Path:C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\is-KU6HQ.tmp\is-QPTG8.tmp" /SL4 $40228 "C:\Users\user\Desktop\file.exe" 1252960 51712
                Imagebase:0x400000
                File size:658944 bytes
                MD5 hash:85B94E72C3F2D2B5464E2AAF3C9E242A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Antivirus matches:
                • Detection: 4%, ReversingLabs
                Reputation:moderate

                Target ID:2
                Start time:20:04:02
                Start date:24/11/2022
                Path:C:\Program Files (x86)\PrintFolders\PrintFolders.exe
                Wow64 process (32bit):true
                Commandline:"C:\Program Files (x86)\PrintFolders\PrintFolders.exe"
                Imagebase:0x400000
                File size:1990648 bytes
                MD5 hash:2ABBE052537A4C836AFE8DBAC888F131
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000002.00000002.325696039.0000000001660000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000002.00000002.326103420.00000000033A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000002.00000002.325006522.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                Reputation:low

                Target ID:3
                Start time:20:04:06
                Start date:24/11/2022
                Path:C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\uywwtiNQ.exe
                Wow64 process (32bit):true
                Commandline:
                Imagebase:0xbc0000
                File size:73728 bytes
                MD5 hash:3FB36CB0B7172E5298D2992D42984D06
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Antivirus matches:
                • Detection: 46%, ReversingLabs
                Reputation:high

                Target ID:13
                Start time:20:04:39
                Start date:24/11/2022
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\cmd.exe" /c taskkill /im "PrintFolders.exe" /f & erase "C:\Program Files (x86)\PrintFolders\PrintFolders.exe" & exit
                Imagebase:0xb0000
                File size:232960 bytes
                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:14
                Start time:20:04:39
                Start date:24/11/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff745070000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:15
                Start time:20:04:39
                Start date:24/11/2022
                Path:C:\Windows\SysWOW64\taskkill.exe
                Wow64 process (32bit):true
                Commandline:taskkill /im "PrintFolders.exe" /f
                Imagebase:0xd80000
                File size:74752 bytes
                MD5 hash:15E2E0ACD891510C6268CB8899F2A1A1
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                No disassembly